Atos Global It Solutions And Services Private Limited
3 - 6 Years
Not Specified

Job Description

Job Description :

What are we looking for

We are looking for a highly motivated, dedicated and structured teammate, who could join our Automation team, located in Bangalore.

Atos Cyber Security is one of the fastest growing areas of Atos with significant growth plans through additional recruitment and acquisitions. The role requires working within a 8x5 SOC operational support environment incorporating a tiered Security support model across a range of Security support functions in Qatar.

Your primary objective will be too proactively monitor and hunt through customer environments to detect and respond to information security threats. You will help to protect an organization by employing a range of technologies and processes to prevent, detect and manage cyber threats. This can include protection of computers, data, networks and applications.

The Security Operations Analyst Level 3 role is tasked with evaluating SIEM (Security Incident Event Manager) related events flagged for review by established strategies. This evaluation is performed with various validation tools, understanding and application of computer security topics and malware infections, and identification of new techniques to make quick decisions with a high rate of accuracy. The person in this role will contribute to the strategic development of a new pilot program aimed at further enhancing the world-class experience. The Security Operations Analyst Level 3 is expected to adhere to numerous Key Performance Indicators to ensure decisions are made balancing factors such as risk tolerance and customer experience.

Another responsibility of this role is to help train machine learning models by labeling transactions, queries, or other entity pairings.

Profile Requirements

  • Proposition of specific recommendations
  • Investigate and solves security breaches and other cyber security incidents and provide incident response.
  • Incident analysis for correlation rules design and implementation
  • Business use-cases design and deployment
  • Check of applied recommendation for L3 incidents
  • Validates weekly, monthly, quarterly, half and yearly reports
  • Definition and follow up of incident reconstruction plans
  • Malware analysis, reverse engineering
  • Deals with incidents from L2 and investigation and qualification of L2 incidents
  • Access to tiers tools for investigation
  • Development, fine-tuning, and implementation of threat detection analytics
  • Provides investigation on complex incidents
  • Provides forensics investigation and analysis ( memory, filesystem, network, mobile iOS/Android forensics,
  • Analyze and provides threat intelligence information
  • Provides advisories on incident modelling and reconstruction
  • Define new correlation rules in the SIEM depens on the requirements
  • Provides security crisis management
  • Very good communication skills with fluent English
  • Deep log analysis skills on SIEM - Logrhythm, Logrhythm experience and knowhow will be plus.
  • Very good knowledge of Windows and/or Linux/Unix,
  • Very good understanding of security incidents, networking and common protocols,
  • Scripting in Python, Bash, Perl, PowerShell.
  • Review standard security arrangements — that is, provide external/semi-external reviews
  • Manage audits and training for new threats
  • Stay current on IT security trends and news.
  • Analyze for attacks, intrusions and unusual, unauthorized or illegal activity
  • Investigate new vulnerabilities and share the latest industry-level responses
  • Investigate security breaches and other cyber security incidents and provide incident response.
  • Liaise with different internal and external stakeholders when an incident occurs
  • Manage remotely‑stored critical information (passwords, network configs, etc.) in an emergency
  • Use advanced analytic tools to determine emerging threat patterns and vulnerabilities
  • liaise with stakeholders in relation to cyber security issues and provide future recommendations
  • Install security measures and operate software to protect systems and information infrastructure, including firewalls and data encryption programs.
  • Document security breaches and assess the damage they cause.
  • Work with security team to perform tests and uncover network vulnerabilities.
  • Fix detected vulnerabilities to maintain a high-security standard.
  • Stay current on IT security trends and news.
  • Research security enhancements and make recommendations to management.
  • Min 3 years of SOC Level 2 and Min 2 years of SOC Level 3 experience.

Your application

If you wish to apply for this position and be part of this ambitious and dedicated team, please visit our careers page at, select India as country and complete our online application form.

Workplace culture improves teamwork, connect with Atos and we will build together a positive work culture. We are a company, passionate about employee happiness as well as company growth. We offer you not only a significant and exciting workplace, but also a rewording work experience and excellent benefits.

We are an equal opportunity employer and value diversity at our company. We do not discriminate on the basis of race, religion, color, national origin, gender, sexual orientation, age, marital status, veteran status, or disability status.


People Also Considered

Career Advice to Find Better