USI T&I/IT Security – Analyst/Senior Analyst – SIEM Analyst and Vulnerability Management
Work you’ll do
Position Summary
The Analyst will play a key role in ensuring effective log integration, monitoring, and vulnerability management within the organization’s security operations. This position requires strong knowledge of Security Operations Center (SOC) processes and experience with Splunk. The analyst will coordinate with application owners and Splunk administrators to ensure proper log onboarding, validation, and use case development, as well as assist with vulnerability remediation efforts and identification of new threats.
Key Responsibilities
· Coordinate Log Onboarding: Work closely with application owners and Splunk administrators to ensure logs are properly onboarded to Splunk, following established procedures and best practices.
· Log Validation: Validate that logs are accurately ingested into Splunk and meet required format and completeness standards.
· Security Use Case Development: Identify and define security use cases that should be triggered by the ingested logs, collaborating with relevant stakeholders to ensure effective detection capabilities.
· Reporting and Monitoring: Develop and maintain reports and dashboards in Splunk to monitor log ingestion, validate log sources, and ensure ongoing visibility into log health and coverage.
· Integration Identification: Proactively identify applications and systems not yet integrated with Splunk and coordinate efforts to onboard them for comprehensive security monitoring.
· Vulnerability Management Support: Assist with vulnerability remediation efforts by coordinating with relevant teams, tracking remediation progress, and validating closure of identified vulnerabilities.
· Threat and Vulnerability Identification: Monitor for new threats and vulnerabilities, analyze their potential impact, and recommend actions to mitigate associated risks.
· Continuous Improvement: Recommend enhancements to logging processes, detection use cases, vulnerability management, and reporting to strengthen the organization’s security posture.
Required Skills & Experience
· Strong understanding of Security Operations Center (SOC) workflows and processes.
· Knowledge with Splunk, including log onboarding, validation, and reporting.
· Ability to coordinate and communicate effectively with application owners and Splunk administrators.
· Experience in developing and validating security use cases based on log data.
· Familiarity with vulnerability management processes, including remediation tracking and threat identification.
· An analytical mindset with attention to detail and a proactive approach to identifying gaps and opportunities for improvement.
· Proficiency in creating reports and dashboards within Splunk.
Work Location: Hyderabad
Shift Timings: 11 AM to 8 PM or 2 PM to 11 PM IST.