Want to hear how I work? Hit play.Kablio AI applies for you. You just show up to the interviewKablio AI helps you secure roles in construction, clean energy, facilities management, engineering, architecture, sustainability, environment and other physical world sectors.
Get hired, get rewarded!
Land a job through Kablio and earn a 5% salary bonus.
Exclusive benefits
5%Bonus
SOC Engineer
Nextracker Inc.
Innovative solar tracker solutions for clean energy generation and grid integration.
SOC Engineer monitors, detects, and responds to security threats while leading solution deployment.
13d ago
Intermediate (4-7 years)
Full Time
Hyderabad, Telangana, India
Office Full-Time
Company Size
1,300 Employees
Service Specialisms
Solar tracker manufacturing
Software solutions
Energy storage
Predictive modeling
Technical services
Global support
Project development
Engineering
Sector Specialisms
Energy
Solar
Utility-scale Solar
Distributed Generation
Manufacturing
Sustainable Supply Chain
Renewable Energy
Steel Industry
Role
What you would be doing
incident response
security operations
solution deployment
alert tuning
automation
team training
Develop the technical skills of the junior SOC analysts in the team to empower them to be more effective and efficient in their roles
Perform platform health checks to ensure that our security solutions are operating effectively and efficiently
Drive continuous improvement to reduce threat dwell time in our environment through automation, process simplification, among others.
Use tools to respond to incidents, and actively improve the cyber security posture of the company.
Work closely with the Penetration Test Team, Cyber Hunt Team, Threat Intel, and other internal organizations to achieve the shared vision of improving the company’s cyber security posture.
Champion security standard methodologies across the organization
Own and operate most important security solutions designed to protect the company from cyber threats and attacks
Lead in deploying new solutions and technologies to improve the security posture of the company.
Continuous fine-tuning of our security solutions to reduce the occurrence of false positive and false negative alerts
Act as L3 escalation point in analyzing and responding to security incidents from various security technologies and platforms.
Conduct incident response, identify vulnerabilities, and consult on remediation steps.
Effectively communicate technical information to non-technical audiences and influence others to follow policies and conform to standards and methodologies.
What you bring
ceh
cissp
cloud security
network security
malware analysis
fire eye
Ability to work with diverse groups such as the Cyber Incident Response team (CIRT), Penetration Testing team, etc in order to mitigate a security threat
Preferably with relevant experience on key leading-edge security solutions such as Fire Eye, Proofpoint, Imperva, etc.
Strong leadership skills with the ability to interact with key partners including Senior Management, ability to articulate security events in a concise and understandable manner.
Eager to work in 24x7 Environment covering 3 shits.
Malware Analysis – ability to perform complex analysis to understand the properties and behaviors of a malware and propose effective countermeasures and mitigation strategies
Cloud Security (AWS, Azure, GCP)
Network Security (IPS/IDS), Security protocols and Operating Systems (Windows, Unix, Linux)
Log Analysis and Correlation
User behavior Analysis – ability to piece together user activities to recognize patters of malicious behaviors
Enterprise Endpoint Security and Email Security
Bachelor’s degree in Information Systems, Information Technology (IT), Computer Science, Engineering, or other technical / IT field and / and at least 5+ years of relevant experience.
Hey there! Before you dive into all the good stuff on our site, let’s talk cookies—the digital kind. We use these little helpers to give you the best experience we can, remember your preferences, and even suggest things you might love. But don’t worry, we only use them with your permission and handle them with care.