(Contract role – 6 to 9 months with possible extension)
With more than 180,000 people in over 42 countries, Capgemini is one of the world’s foremost providers of consulting, technology and outsourcing services. The Group reported 2015 global revenues of EUR 11.9 billion. Together with its clients, Capgemini creates and delivers business and technology solutions that fit their needs and drive the results they want.
A deeply multicultural organization, Capgemini has developed its own way of working, the Collaborative Business ExperienceTM, and draws on Rightshore®, its worldwide delivery model. Learn more about us at www.capgemini.com. …
Rightshore® is a trademark belonging to Capgemini
Capgemini’s robust Outsourcing offerings include:
Applications Management, Infrastructure Management and Business Process Management
We combine these services with our deep industry knowledge and experience to provide the change agent to accelerate business growth. We generate quality and speed through our proven tools, methods and global centers. These capabilities, coupled with our program management expertise are tailored to fit the most challenging business needs.
The Security Operation Center (SOC) Analyst will work to monitor, and analyze data relating to Company’s Information Security including Authentication, Remote Access, and Security controls.
Security controls includes technologies like Firewalls, Antivirus and Intrusion Prevention Systems.
The Analyst mines massive data stores using automated and manual processes to detect security incidents and breaches globally.
The analyst will work with the Security Event Information System (SEIM) to identify both obvious attacks and stealthy ones.
Incidents detected would then be fed to incident response services or existing break fix services.
The SOC analyst will work to improve Company’s detection capabilities and will stay informed on emerging threats to help Company foresee and prepare for future security threats.
The analyst ensures risk reduction by developing rapid detection strategies and improving the time to detection so that Company incident responders have priority information as quickly as possible.
The analyst will organize strategic information about threats detected within the environment for knowledge transfer and assist other security organizations by sharing the latest information on the most recent threats to help inform future security strategies.
The SOC analyst will create reports and dashboards that will track priority security events. Reports showing Key Progress Indicators and executive summaries will be created and improved to provide tactical and strategic information to security management.
The analyst will also monitor the health of the SIEM itself and ensure that the detection and monitoring facilities are healthy and improving visibility over time.
The SOC will be monitoring thousands of systems and the analyst must work to ensure this monitoring capability is functioning and well maintained.
5 -8 years in IS/IT Security.
Security Certifications like CISSP or CEH would be a plus.
– The analyst will reduce the time to remediation for virus infection and other malware activity.
– The analyst will improve the overall detection capability and the processes that support it.
– The Analyst helps ensure that vulnerabilities and threats detected are remediated.
– The analyst creates work instructions, with guidance for technical responders in the field, to help them respond appropriately to any particular threat detected
– He/She recommends new security controls based on threats detected and vulnerabilities discovered to better protect Company data, confidentiality and business conti