6

applicants

Technical Lead Full-time

at Wipro Limited in Gurgaon (Published at 02-05-2019)

\ Creation for Roster for the SOC
Monthly/Weekly meeting with Client to discussed the requirements and modification required for SOC
Creating Polices and Processes for SOC
Creating Architecture to deploy ArcSight(SIEM) as per the client requirement
ArcSight ESM Installation and configuration
ArcSight Logger Installation and configuration
ArcSight Smart Connector Installation and configuration
ArcSight connector appliance configuration and implementation
Network and Asset modelling
Log Source Device integration
Flex Development for Unsupported devices
Content development in ESM(Correlated Rules, reports and Dashboards)
Content development in Logger(Alert, reports and Dashboards)
To create Correlation Rules/Reports/Dashboards based on log analysis in order to detect various
Security Threats and Malicious Activity on the network as per client’s requirement
Backup and restore
Troubleshooting related ESM, Logger and Smart Connector
Locking ticket with HP ArcSight support to troubleshoot unsolved issue
Monitoring correlated Alerts/Alerts in ESM
Monitoring correlated Dashboards/Dashboards in ESM
Supporting escalated case for L3
Preparing SOPs, presentations and various Work Instruction documents for the project.
Keeping track of any attack exploit in iNOC network
Enterprise security architectures and security components that implement these architectures including SIEM, AV and leading security products.
ArcSight administration for configuration and developing correlation rules for different devices.
Enterprise network architectures, topologies and components that implement these networks including TCP/IP, firewalls, proxies, and routers.
Client/server architectures and, server and end point component and technologies including Linux and Microsoft servers, computers, and mobile devices.
Conduct open-source and classified research on emerging/trending threats and vulnerabilities.
Deploying, managing MacAfee ePO, and McAfee HDLP for the entire network.
Setup different types of honeypots to collect malware samples.
Create finished, all-source intelligence assessments for inclusion in various Agency and IC intelligence products.
Performs analysis related to the detection, characterization, monitoring and warning of suspected unauthorized network activity and relationships that may pose a threat.
Provides rapid response to ad hoc requests from decision makers (e.g., special intelligence analyses or personal briefings).
Developing analytical tools and methodologies to fill present gaps and address future gaps.
Reviews reported tips and leads for threat information and situational awareness, including determining location, activity, and severity and reporting trends
Worked closely with top level government and corporate officials assisting them with forensic and fraud investigation cases.
Conduct data breach and security incident investigations according to needs of Client.
Build Forensic investigation procedures based client requirements.
Ensure that chain of custody, evidence preservation procedures have being followed during the course of investigation and draft technical reports.


Viewed: 248 times
« Go back to category
Is this job ad fake? Report it!   
Recommend to a friend