Good knowledge of SIEM, SIEM Architecture, SIEM health check.Deployment of SIEM in customer environment.Audit the SIEM in the customer environment.Troubleshoot issues regarding SIEM and other SOC tools.Good verbal/written communication skills.Build of use case for the customer.Data archiving and backup and data purging configuration as per need and compliance.Raising change management tickets for SOC Administration activities like Patch upgrade for SIEM, onboarding log sources etc.Helping L2 and L1 with required knowledge base details and basic documentations.Co-ordination with L2 and SOC Monitoring team for troubleshooting issues and highlighting them to clients for further resolution and escalation.High ethics, ability to protect confidential information.Troubleshooting at device and connector/agent end to fix the anomaly reported by other team and observed on day to day basis.Building of incident reports, advisories and review if SLA has been met for Incident alerting and Incident closure.Update and maintain SOC knowledge base for new security incidents and docs.Creation of daily status report sheet and submit to SOC manager for review.Review advisories and make necessary detection measures.Provide analysis and trending of security log data from a large number of security devices.Troubleshooting non-reporting devices fix and maintain device status.Working with OEM (Tool support) in a way to resolve the issue or incident raised.Administration of Windows and Unix servers.Building Parser for the SIEM using regex.Ready to work on 24/7 shifts to support client requirement.Who you are:The Security Analyst monitors security events from the various SOC entry channels (SIEM, Tickets, Email and Phone), based on the security event severity, escalate to managed service support teams, tier2 information security specialists, and/or customer as appropriate to perform further investigation and resolution.What you'll do: Deployment of SIEM in customer environment.Audit the SIEM in the customer environment.Troubleshoot issues regarding SIEM and other SOC tools.Build of use case for the customer.Data archiving and backup and data purging configuration as per need and compliance.Raising change management tickets for SOC Administration activities like Patch upgrade for SIEM, onboarding log sources etc.Helping L2 and L1 with required knowledge base details and basic documentations.Co-ordination with L2 and SOC Monitoring team for troubleshooting issues and highlighting them to clients for further resolution and escalation.Troubleshooting at device and connector/agent end to fix the anomaly reported by other team and observed on day to day basis.Building of incident reports, advisories and review if SLA has been met for Incident alerting and Incident closure.Update and maintain SOC knowledge base for new security incidents and docs.Creation of daily status report sheet and submit to SOC manager for review.Review advisories and make necessary detection measures.Provide analysis and trending of security log data from a large number of security devices.Troubleshooting non-reporting devices fix and maintain device status.Working with OEM (Tool support) in a way to resolve the issue or incident raised.Administration of Windows and Unix servers.Building Parser for the SIEM using regex.How we'll help you grow:IBM is committed to create a diverse environment and is proud to be an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, genetics, disability, age, or veteran status.You'll have access to all the technical, management and leadership training courses you need to become the expert you want to beYou'll learn directly from sales leaders and senior leadership teamYou have the opportunity to work in many different areas to figure out what really excites you