This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
To support our continued success and deliver a Fanatical Experience™ to our customers, Rackspace Cyber Defence is looking an Indian based Security Operations (SecOps) Analyst (L1) to support Rackspace's strategic customers. This role is particularly well-suited to a self-starting, experienced and motivated SecOps Analyst (L1), who has a proven record of accomplishment in the cloud security monitoring and incident detection domain. As a SecOps Analyst (L1), you will be responsible for detecting, analysing, and responding to threats posed across customer on-premises, private cloud, public cloud, and multi-cloud environments. The primary focus will be on triaging alerts and events (incident detection), which may indicate malicious activity, and determining if threats are real or not. You will also be required to liaise closely with the customer’s key stakeholders, which may include incident response and disaster recovery teams as well as information security.
Job Responsibility:
Ensure the Customer’s operational and production environment remains secure at all the times and any threats are raised and addressed in a timely manner
Analysis, handling, escalation of alerts from cloud-native SIEM (Security Information and Event Management) platforms
Carry out preliminary investigation on the event and act as per KB
Identification of false positives
Following SLA (Service Level Agreement) notification process based on alert severity
Creating tickets on the Customer ITSM ticketing system
Update runbooks, playbooks and knowledgebase documents
Sharing SLA details for weekly and monthly reports
Provide the data or details for use case creation, detection engineering or enhancements
Provide the data or details for the tuning of threat detections, log sources, dashboards, analytics rules and/or automations
Identification of a customer’s critical assets with technical tools and interviews
Use of, enhancement of, or implementation of new, relevant technology tooling to ensure a customer’s configuration and security policies are enforced
Use of threat intelligence platforms such as OSINT, to understand latest threats
Researching and analysing the latest threats to better understand an adversary’s tactics, techniques, and procedures (TTPs)
Automation of security processes and procedures to enhance and streamline monitoring capabilities
Ensure All vulnerabilities are resolved within agreed SLA time limits by respective teams
Maintain close working relationships with relevant teams and individual key stakeholders, such as incident response and disaster recovery teams as well as information security etc
Requirements:
Existing experience as a Security Operations Analyst/Engineer or equivalent
Experience of working in large scale, public cloud environments and with using cloud native security monitoring tools
Experience of analysing malware and email headers
Skills in network security, intrusion detection and prevention systems, operating systems, risk identification and analysis, threat identification and analysis and log analysis
Experience of security controls
Knowledge of security standards (good practice) such as NIST, ISO27001, CIS, OWASP and Cloud Controls Matrix (CCM)
Knowledge of scripting and coding with languages such as Terraform, python, javascript, golang, bash and/or powershell
Knowledge of DevOps practices such as CI/CD, Azure DevOps, CircleCI, GitHub Actions, Ansible and/or Jenkins
Computer science, engineering, or information technology related degree (although not a strict requirement)
Holds one, or more, of the following certificates (or equivalent): CISSP, AZ500, SC-200, CPIA, CRIA, CCNIA, SSCP, CCSP, GCIH, GSOC
A highly self-motivated and proactive individual who wants to learn and grow and has an attention to detail
A great analyser, trouble-shooter and problem solver who understands security operations, programming languages and security architecture
Highly organised and detail oriented
Ability to prioritise, multitask and work under pressure
An individual who shows a willingness to go beyond in delighting the customer
Willing to work in 24/7 Rotational shift
Nice to have:
Sentinel Experience is a plus
Nice to have skills/experience includes: GCP (Google Cloud Platform)security tools such as Chronicle and Security Command Centre
AWS (Amazon Web Services) security tools such as Security Hub, AWS Guard Duty, AWS Macie, AWS Config and AWS CloudTrail