Monthly/Weekly meeting with Client to discussed the requirements and modification required for SOC
Creating Polices and Processes for SOC
Creating Architecture to deploy ArcSight(SIEM) as per the client requirement
ArcSight ESM Installation and configuration
ArcSight Logger Installation and configuration
ArcSight Smart Connector Installation and configuration
ArcSight connector appliance configuration and implementation
Network and Asset modelling
Log Source Device integration
Flex Development for Unsupported devices
Content development in ESM(Correlated Rules, reports and Dashboards)
Content development in Logger(Alert, reports and Dashboards)
To create Correlation Rules/Reports/Dashboards based on log analysis in order to detect various
Security Threats and Malicious Activity on the network as per client’s requirement
Backup and restore
Troubleshooting related ESM, Logger and Smart Connector
Locking ticket with HP ArcSight support to troubleshoot unsolved issue
Monitoring correlated Alerts/Alerts in ESM
Monitoring correlated Dashboards/Dashboards in ESM
Supporting escalated case for L3
Preparing SOPs, presentations and various Work Instruction documents for the project.
Keeping track of any attack exploit in iNOC network
Enterprise security architectures and security components that implement these architectures including SIEM, AV and leading security products.
ArcSight administration for configuration and developing correlation rules for different devices.
Enterprise network architectures, topologies and components that implement these networks including TCP/IP, firewalls, proxies, and routers.
Client/server architectures and, server and end point component and technologies including Linux and Microsoft servers, computers, and mobile devices.
Conduct open-source and classified research on emerging/trending threats and vulnerabilities.
Setup different types of honeypots to collect malware samples.
Create finished, all-source intelligence assessments for inclusion in various Agency and IC intelligence products.
Performs analysis related to the detection, characterization, monitoring and warning of suspected unauthorized network activity and relationships that may pose a threat.
Provides rapid response to ad hoc requests from decision makers (e.g., special intelligence analyses or personal briefings).
Developing analytical tools and methodologies to fill present gaps and address future gaps.
Reviews reported tips and leads for threat information and situational awareness, including determining location, activity, and severity and reporting trends
Conduct data breach and security incident investigations according to needs of Client.
Functions : IT
Industries : IT/Computers - Hardware, IT/Computers - Software
Skills/Roles I hire for: Sql Dba, Sap Abap, SSE, Java, Sap Basis, .NET, Sap Security, Aix Admin, Oracle Soa
level Hiring For: Junior Level, Mid Level
Simple body text this will replace with orginal content