SOC Analyst L1 (Sentinel is mandatory) - Bangalore/Pune/Delhi
India - Gurgaon
Public Cloud - Offerings and Delivery – Cloud Security and Collab /
Full - Time /
Hybrid
Role Name
SecOps Analyst L1
Experience - 3-5years
Sentinel Experience is a plus
Work Pattern
Rotational Shift (24x7, 5 on 2 off)
About Rackspace Cyber Defence
Rackspace Cyber Defence is our next generation cyber defence and security operations capability that builds on 20+ years of securing customer environments to deliver proactive, risk-based, threat-informed and intelligence driven security services.
Our purpose is to enable our customers to defend against the evolving threat landscape across on-premises, private cloud, public cloud and multi-cloud workloads.
Our goal is to go beyond traditional security controls to deliver cloud-native, DevOps-centric and fully integrated 24x7x365 cyber defence capabilities that deliver a proactive, threat-informed, risk-based, intelligence-driven approach to detecting and responding to threats.
Our mission is to help our customers:
Proactively detect and respond to cyber-attacks – 24x7x365.
Defend against new and emerging risks that impact their business.
Reduce their attack surface across private cloud, hybrid cloud, public cloud, and
multi-cloud environments.
Reduce their exposure to risks that impact their identity and brand.
Develop operational resilience.
Maintain compliance with legal, regulatory and compliance obligations.
What we’re looking for
To support our continued success and deliver a Fanatical Experience™ to our customers, Rackspace Cyber Defence is looking an Indian based Security Operations (SecOps) Analyst (L1) to support Rackspace's strategic customers.
This role is particularly well-suited to a self-starting, experienced and motivated SecOps Analyst (L1), who has a proven record of accomplishment in the cloud security monitoring and incident detection domain.
As a SecOps Analyst (L1), you will be responsible for detecting, analysing, and responding to threats posed across customer on-premises, private cloud, public cloud, and multi-cloud environments.
The primary focus will be on triaging alerts and events (incident detection), which may indicate malicious activity, and determining if threats are real or not. You will also be required to liaise closely with the customer’s key stakeholders, which may include incident response and disaster recovery teams as well as information security.
Key Accountabilities
· Should have experience of 3 to 5 years in SOC.
· Ensure the Customer’s operational and production environment remains secure at all the times and any threats are raised and addressed in a timely manner.
Analysis, handling, escalation of alerts from cloud-native SIEM (Security Information and Event Management) platforms.
Carry out preliminary investigation on the event and act as per KB
Identification of false positives
Following SLA (Service Level Agreement) notification process based on alert severity.
Creating tickets on the Customer ITSM ticketing system.
Update runbooks, playbooks and knowledgebase documents.
Sharing SLA details for weekly and monthly reports.
Provide the data or details for use case creation, detection engineering or enhancements.
Provide the data or details for the tuning of threat detections, log sources, dashboards, analytics rules and/or automations.
· Identification of a customer’s critical assets with technical tools and interviews.
· Use of, enhancement of, or implementation of new, relevant technology tooling to ensure a customer’s configuration and security policies are enforced.
· Use of threat intelligence platforms such as OSINT, to understand latest threats. Researching and analysing the latest threats to better understand an adversary’s tactics, techniques, and procedures (TTPs).
· Automation of security processes and procedures to enhance and streamline monitoring capabilities.
· Ensure All vulnerabilities are resolved within agreed SLA time limits by respective teams.
· Maintain close working relationships with relevant teams and individual key stakeholders, such as incident response and disaster recovery teams as well as information security etc.
· Willing to work in 24/7 Rotational shift.
Skills & Experience
· Existing experience as a Security Operations Analyst/ Engineer, or equivalent.
· Experience of working in large scale, public cloud environments and with using cloud native security monitoring tools such as: -
o Microsoft Sentinel
o Microsoft 365 Defender
o Microsoft Defender for Cloud
o Endpoint Detection & Response (EDR) tools such as Crowdstrike, Microsoft Defender for Endpoint.
o Firewalls and network security tools such as Palo Alto, Fortinet, Juniper, and Cisco.
o Web Application Firewall (WAF) tools such as Cloudflare, Akamai and Azure WAF.
o Email Security tools such as Proofpoint, Mimecast and Microsoft Defender for Office
o Data Loss Prevention (DLP) tools such as Microsoft Purview, McAfee and Symantec
o Nice to have skills/experience includes:
GCP (Google Cloud Platform)security tools such as Chronicle and Security Command Centre
AWS (Amazon Web Services) security tools such as Security Hub. AWS Guard Duty, AWS Macie, AWS Config and AWS CloudTrail
· Experience of analysing malware and email headers, and has skills in network security, intrusion detection and prevention systems; operating systems; risk identification and analysis; threat identification and analysis and log analysis.
· Experience of security controls, such as network access controls; identity, authentication, and access management controls (IAAM); and intrusion detection and prevention controls.
. Knowledge of security standards (good practice) such as NIST, ISO27001, CIS (Center for Internet Security), OWASP and Cloud Controls Matrix (CCM) etc.
Knowledge of scripting and coding with languages such as Terraform, python, javascript, golang, bash and/or powershell.
Knowledge of DevOps practices such as CI/CD, Azure DevOps, CircleCI, GitHub Actions, Ansible and/or Jenkins.
· Computer science, engineering, or information technology related degree (although not a strict requirement)
· Holds one, or more, of the following certificates (or equivalent): -
Certified Information Security Systems Professional (CISSP)
Microsoft Certified: Azure Security Engineer Associate (AZ500)
Microsoft Certified: Security Operations Analyst Associate (SC-200)
CREST Practitioner Intrusion Analyst (CPIA)
CREST Registered Intrusion Analyst (CRIA)
CREST Certified Network Intrusion Analyst (CCNIA)Systems
Security Certified Practitioner (SSCP)
Certified Cloud Security Professional (CCSP
GIAC Certified Incident Handler (GCIH)
GIAC Security Operations Certified (GSOC)
A highly self-motivated and proactive individual who wants to learn and grow and has an attention to detail.
A great analyser, trouble-shooter and problem solver who understands security operations, programming languages and security architecture.
Highly organised and detail oriented. Ability to prioritise, multitask and work under pressure.
An individual who shows a willingness to go beyond in delighting the customer.
About Rackspace Technology
We are the multicloud solutions experts. We combine our expertise with the world’s leading technologies — across applications, data and security — to deliver end-to-end solutions. We have a proven record of advising customers based on their business challenges, designing solutions that scale, building and managing those solutions, and optimizing returns into the future. Named a best place to work, year after year according to Fortune, Forbes and Glassdoor, we attract and develop world-class talent. Join us on our mission to embrace technology, empower customers and deliver the future.
More on Rackspace Technology
Though we’re all different, Rackers thrive through our connection to a central goal: to be a valued member of a winning team on an inspiring mission. We bring our whole selves to work every day. And we embrace the notion that unique perspectives fuel innovation and enable us to best serve our customers and communities around the globe. We welcome you to apply today and want you to know that we are committed to offering equal employment opportunity without regard to age, color, disability, gender reassignment or identity or expression, genetic information, marital or civil partner status, pregnancy or maternity status, military or veteran status, nationality, ethnic or national origin, race, religion or belief, sexual orientation, or any legally protected characteristic. If you have a disability or special need that requires accommodation, please let us know.