Qualys Logo

Qualys

Senior Security Operations Engineer

Posted 5 Days Ago
Be an Early Applicant
In-Office
Pune, Mahārāshtra
Mid level
In-Office
Pune, Mahārāshtra
Mid level
As a Senior Security Operations Engineer, you will oversee incident management, monitor security systems, conduct investigations, and enhance organizational security posture through proactive threat detection and incident response activities.
The summary above was generated by AI

Come work at a place where innovation and teamwork come together to support the most exciting missions in the world!

Job Overview:

As a Senior Security Operations Engineer, you will be an integral part of Qualys SOC (Security Operation Center) and CSIRT (Cyber Security Incident Response Team) contributing to the day-to-day activities aimed at governing entire incident management lifecycle from incident monitoring, triaging, analyzing, and responding to security incidents. This role requires a solid understanding of security technologies, incident triage/investigation & incident response, and a proactive approach to identifying and mitigating potential threats. You will leverage advanced cybersecurity tools and techniques to monitor and secure Qualys infrastructure/systems, Qualys Cloud Platforms, respond to alerts, investigate potential threats, and proactively work for mitigation of identified cyber threats/incidents. At the same time, you will be responsible for providing expert guidance to other SOC engineers in the team and working closely with SOC/CSIRT leadership to improve the organization’s security posture.

 

Key Responsibilities:

Security Monitoring and Analysis:

  • Proactively monitor security systems, SIEM platforms, various security tools, analyze logs, network traffic, system events and incident alerts for signs of malicious activity or policy violation. 
  • Conduct incident triage, build incident investigation hypothesis, incident response approach. 
  • Investigate and respond to alerts, ensuring a timely and effective resolution.
  • Review the triggered incident and analyze the incident tickets created by SOC level 1 engineers for correct incident classification, categorization, setting up security permission, false positive validation and finetuning etc.
  • Must be familiar with various log sources and investigation approach depending on various kinds of incidents. Should understand the correlation between log sources as needed for investigation.
  • Analyze network and host activities associated with both successful and unsuccessful intrusions by threat actor's basis perimeter security logs.
  • Should have experience in correlating malware infections with attack vectors to determine the extent of security and data compromise.
  • Monitor SIEM and other security tools alerts for anomalous or suspicious activity; research alerts and make recommendations to remediate concerns.
  • Analyze, correlate and action on data from subscription and public cyber intelligence services, develop tactics to combat future threats, and follow the Incident Response Plan for required response.
  • The ability to perform analysis of log files from multiple different devices and environments and identify indicators of security threats.
  • You will be responsible for assisting all junior SOC engineers related to incident monitoring, investigation and response.

Incident Response:

  • Participate in incident response activities, assisting in the identification, containment, eradication, and recovery from security incidents.
  • Run incident response calls with help of CSIRT lead/manager via incident warroom and bridge call to other incident resolution teams.
  • Document incident response activities along with entire incident timelines and contribute to post-incident reports.

Threat Detection & Analysis:

  • Analyze logs, security events, and network traffic for anomalies and indicators of compromise (IOCs).
  • Perform forensic analysis on potentially compromised systems using in-house digital forensic lab.
  • Conduct sandbox analysis and obtain report for various malicious code/payloads identified in case of infected systems.

Security Tool Management:

  • Configure and manage security tools such as Endpoint Detection and Response (EDR), Endpoint Protection Platforms (EPP), File Integrity Monitoring (FIM), Application Control (Whitelisting/Blacklisting) on endpoints etc.
  • Identify different attack patterns (IOA - Indicator of Attacks) in security logs which can cause harm to our system. Work with SIEM detection team to convert these patterns into an automated detection logic on SIEM platform.

Threat Intelligence Support:

  • Configure and manage the open source and in-house threat intelligence sharing platform.
  • Assist in the integration of threat intelligence into security operations processes to enhance detection capabilities.
  • Stay informed about the latest cybersecurity threats and vulnerabilities via various cyber security newsletters and security advisories. Notify SOC team about actionable for identified advisories. 

Threat Hunting:

  • Conduct proactive threat-hunting activities to identify emerging threats and weaknesses in the organization’s security defenses.
  • Follow organization threat hunting procedure to carry out our various threat hunting activities and work on remediation of identified misconfigurations/security issues during hunt.

Incident Response Documentation & SOAR Runbook Creation:

  • Work with CSIRT lead/manager to build incident response runbooks for remediation of various cyber-attack scenarios.
  • Identify unknown attack patterns by analyzing various log sources and work with SIEM administration team to convert them into automated use cases.
  • Translate conceptual SOC/IR requirements into technical data and integration requirement for SOAR platform.
  • Work with SIEM/SOAR admin team to convert the technical data into SOAR playbooks.
  • Enhance existing incident response runbooks and work on fine tuning of existing use cases on SIEM platform.

Experience:

  • 2-4 years of working experience in a Security Operations Center (SOC) or Incident Response role.

Top Skills

Edr
Epp
Fim
SIEM

Similar Jobs

10 Hours Ago
Easy Apply
Hybrid
Pune, Mahārāshtra, IND
Easy Apply
Entry level
Entry level
Healthtech • Information Technology • Software • Telehealth
The Integration Support Associate will implement and maintain integrations, troubleshoot issues, support new deployments, and collaborate with teams to enhance patient booking experiences in healthcare.
Top Skills: APIsSQLSystem Integrations
10 Hours Ago
Hybrid
Pune, Mahārāshtra, IND
Expert/Leader
Expert/Leader
Cloud • Computer Vision • Information Technology • Sales • Security • Cybersecurity
As a Sr. Director of Engineering, you'll lead the Exposure management team, shaping technical strategy and overseeing cloud-based solutions development while mentoring engineers.
Top Skills: AWSAzureGCPGoJavaScala
10 Hours Ago
Hybrid
Pune, Mahārāshtra, IND
Senior level
Senior level
Cloud • Computer Vision • Information Technology • Sales • Security • Cybersecurity
Lead a team of buyers in procurement, overseeing strategic sourcing, contract management, and providing executive presentations while managing high-value projects.
Top Skills: Ai ToolsContract Lifecycle Management SystemsCoupaData AnalyticsErp SystemsOracle ProcurementProcurement AutomationSap Ariba

What you need to know about the Mumbai Tech Scene

From haggling for the best price at Chor Bazaar to the bustle of Crawford Market, the energy of Mumbai's traditional markets is a key part of the city's charm. And while these markets will always have their place, the city also boasts a thriving e-commerce scene, ranking among the largest in the region. Driven by online sales in everything from snacks to licensed sports merchandise to children's apparel, the local industry is worth billions, with companies actively recruiting to meet the demands of continued growth.

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account