IT
Role: Security Operations
Location: Westbborough near Boston, MA
Duration: 6+ Months
BGV will be done for the selected candidates.
Activity
Incident analysis and resolution
Adding devices in the monitoring tool
Troubleshooting L2 incidents and closing incidents on the ITSM tool and updating the KB documentation.
Configuration changes as recommended by the L3 team
Log analysis and management - (move logs from log server to reduce memory consumption / resource utilization)
SNMP configuration on security devices.
Creating SOC tool User accounts
Creating user roles
Creating reports and basic dashboards
Monitoring fixing tool license Issues
Vendor coordination and Follow ups (e.g. RMA, TAC, patch upgrade)
Analyzing and reporting threats and attacks
Documentation / risk register / run book / SOP (verification)
Coordination with SME for RCA
SLA and KPI reports
Technology and Component
Checkpoint firewall (version R77.xx) :23 HA clusters
Cisco ASA 51xx series
Blue Coat Secure Web Gateway, CAS, Future = SSL-V appliance
FireEye ETP
Symantec
Tufin
SOC & Security Analysis reporting
Proofpoint
Additional Clarity
Support the security controls and analysis
Resolve incidents provided by the Symantec SaaS SOC up to an L2 experience level
Know when you need to escalate immediately and do so
Follow playbooks that sometimes require immediate actions, like the steps needed to remove a computer from the network that has a virus
Tasks include performing change controls related to the security environment. Examples are patching the security HW/SW environment, rule changes, building VPN B2B ipsec tunnels, other typical security environment changes. More examples: Bluecoat (filter web traffic on corporate networks) changes, Check Point (fire walls) changes
Using the Symantec SOC portal for analyzing the logs, user administration, security control items
Analyzing and managing logs on the security hardware
Using the Tufin cybersecurity network security reporting tool
Using the FireEye ETP tool for email security controls
Using the Proofpoint email security tool
Please respond with your word resume and requested details:
Full Name :
Work Authorization:
Contact Number :
Email ID :
Skype ID:
Current location:
Willing to relocate :
Rate/hr :
All your information will be kept confidential according to EEO guidelines.