More jobs:
Job Description & How to Apply Below
SOC and Cyber Defence Consultant
Duration: 06+ Months (possible extension)
Location:
Noida, Uttar Pradesh, India
Company Overview:
- Fluidech is a technology consulting and managed services firm focused on cybersecurity.
- Founded in 2014 and headquartered in Gurugram—and today with a client base spanning over 100 organisations worldwide—Fluidech designs IT solutions aligned with business objectives, fostering trusted relationships and delivering measurable performance improvements.
- Established as a born-in-the-cloud company, Fluidech has evolved into a trusted technology partner that helps businesses build (Cloud & Infrastructure), automate (Dev Ops), and secure (Cyber Security services). Our solutions span diverse industry verticals, aligned with each client’s business goals.
- In addition to holding ISO 9001 and ISO 27001 certifications and an award-winning cybersecurity team, the company has a strong value proposition in its GRC services across frameworks, including but not limited to NCIIPC’s CAF, SEBI’s CSCRF, and others.
Duties and Responsibilities:
- Lead and manage the Security Operations Centre (SOC) team, partnering with our 3rd party SOC Managed Service Provider (one of the Big Four), driving accountability, and prioritising their efforts by providing direction and support to ensure the team's effectiveness and productivity. Serve as the main internal security operations point of contact for clients.
- Partner with our 3rd-party SOC Managed Service Provider, driving accountability and prioritising their efforts.
- Oversee the day-to-day operations of the SOC team, ensuring effective response to security incidents and alerts.
- Oversee the management of our Managed Security Operations’ managed SIEM, XDR and NDR solutions, and Threat intel and brand protection platforms, ensuring their optimal performance and effectiveness in detecting and responding to security incidents.
- Lead the management and enhancement of MDR and Managed SIEM services, preferably with expertise in Microsoft Sentinel and Trend Micro Vision One.
- Collaborate with the SOC analysts and engineering team to define and implement SIEM rules, alerts, and correlation logic to improve the accuracy and efficiency of threat detection.
- Provide guidance and support to the SOC team in the ingestion and analysis of logs from various systems and applications into the SIEM platform, ensuring 100% log source integration.
- Develop and implement SOC strategies, policies, and procedures to enhance the organisation's security posture and incident response capabilities.
- Oversee the monitoring and analysis of security events and incidents, ensuring timely detection, investigation, and response to potential threats or vulnerabilities.
- Collaborate with cross-functional teams, outside of IT as and when required and also with 3rd party partners, to ensure alignment and effective communication regarding security incidents and mitigation strategies.
- Drive the continuous improvement of SOC processes and procedures to enhance efficiency and effectiveness.
- Taking a proactive role in utilising Threat Intelligence and Threat Hunting activities, ensuring the SOC is ahead of potential security threats.
- Establish and maintain relationships with external partners, vendors, and industry peers to stay updated on emerging threats, best practices, and industry trends.
- Conduct regular assessments and audits of SOC processes, systems, and controls to identify areas for improvement and ensure compliance with regulatory requirements.
- Develop and deliver comprehensive reports and metrics on SOC performance, including incident trends, response times, effectiveness and other SOC key performance indicators.
- Stay abreast of the evolving cybersecurity landscape, emerging threats, and industry standards, providing recommendations for proactive security measures and continuous improvement of the SOC.
- Take complete ownership of clients' Threat Intelligence platform and conduct external brand monitoring, dark web monitoring, data breaches and other associated attack surfaces identified by the threat intelligence platform. Ensure the gaps are closed promptly,…
Note that applications are not being accepted from your jurisdiction for this job currently via this jobsite. Candidate preferences are the decision of the Employer or Recruiting Agent, and are controlled by them alone.
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search:
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search:
Search for further Jobs Here:
×