Service Delivery Manager

Summary:

An L3 SOC 5G Security Analyst will be proficient in creating 5G security use cases on SOC tools, crafting playbooks, perform root cause analysis and implement security improvements and preventive measures.


Principal Functions and Key Responsibilities:

As a part of 5G Intelligence and Analytics Team, you will be responsible for:

  • Create and implement 5G security use cases on SOC tools to identify and respond to threats effectively.
  • Design and maintain detailed security playbooks to streamline incident response and handling processes.
  • Analyze and interpret 5G-specific threat intelligence to adapt and improve defensive measures.
  • Work closely with other SOC members, enhancing team efficiency and knowledge sharing.
  • Conducting detailed analysis of security incidents escalated by SOC Analysts.
  • Performing root cause analysis and advanced investigations to determine the extent of the threat.
  • Responding to and contain security incidents, minimizing their impact on network operations.
  • Using advanced security tools and techniques to analyze and mitigate threats.
  • Collaborating with other teams to implement security improvements and preventative measures.


Qualifications:

  • Bachelor’s or Master’s degree in Cybersecurity, Information Technology, or a relevant field.
  • Familiarity with industry standards and regulatory requirements specific to 5G.
  • Commitment to continuous learning and staying updated with the latest 5G security trends and threats.In-depth understanding of 5G network architecture and associated security protocols.
  • Minimum 5 years of experience in a SOC environment with a focus on L3 responsibilities.
  • Proficiency in SOC tools (e.g., SIEM, SOAR, IDS/IPS) tailored for 5G security.
  • Strong ability to analyze complex data sets and derive actionable intelligence.
  • Experience in developing and presenting KPIs, KRIs, and other performance metrics.
  • Demonstrated expertise in handling and mitigating high-severity security incidents.
  • Skilled in designing and implementing security playbooks and standard operating procedures (SOPs).
  • Experience in 4G/5G Security Operations.
  • Experience working in ISP’s on 4G/5G technologies is a plus.
  • Experience working on Splunk and MS Sentinel.
  • Experience in IT and OT environments.


Certifications: CISSP, Elastic Certified Analyst, GCIH (GIAC Certified Incident Handler), (GIAC Certified Intrusion Analyst), BTL1 (Blue Team Level 3), MITRE Attack Defender (MAD).

Soft Skills: Excellent communication, problem-solving, and leadership skills.


Experience: 7-10years

Post date: 16 September 2024
Publisher: LinkedIn
Post date: 16 September 2024
Publisher: LinkedIn