General Information

Close date:

Sunday, 31 July 2022

Working pattern:

Full time

Contract Type:





86 - IT

Description & Requirements:

Description & Requirements. 
In the role of Level 2 SOC Security Analyst working in a team covering a 24/7 shift rota, you will interface with key stakeholders for different business units and manage expectations at all levels within the business. You will play an important role in addressing real security incidents. Detect and evaluate incidents. Uses threat intelligence such as updated rules and Indicators of Compromise (IOCs) to pinpoint affected systems and the extent of the attack. Analyse running processes and configs on affected systems. Carries out in-depth threat intelligence analysis to find the perpetrator, the type of attack, and the data or systems impacted. Create and implement a strategy for containment and recovery. Manage and prioritise actions during isolation, analysis, and containment of an incident. Communicate any special requirements of high severity incidents to both internal and external stakeholders

Main Activities:

The Level 2 SOC Security Analyst is responsible for conducting information security investigations due to security incidents identified from various SOC entry channels (SIEM, Tickets, Email and Phone).
Act as a point of escalation in support of information security investigations to provide guidance and oversight on incident resolution and containment techniques.
Create and maintain SOC Run books for Both AWS Cloud hosting and corporate systems
Act as the lead coordinator for Bravura Solutions response to individual information security incidents.
Mentor security analysts regarding risk management, information security controls, incident analysis, incident response, SIEM monitoring, and other operational tasks in support of technologies managed by the Security Operations Centre.
Document incidents from initial detection through final resolution. 
Participate vulnerability management.
Participate in evaluating, recommending, implementing, and troubleshooting security solutions and evaluating IT security of the new IT Infrastructure systems.
Works as part of a team to ensure that corporate data and cloud hosting platform components are safeguarded from known threats.
Communicate effectively with customers, teammates, and management.
Prepare Monthly Executive Summary Reports for managed clients and continuously improve their content and presentation.
Provide recommendations in tuning and optimisation of security systems, SOC security process, procedures, and policies.
Define, create, and maintain SIEM correlation rules SPLUNK, customer build documents, security process and procedures.
Follow ITIL practices regarding incident, problem and change management.
Staying up to date with emerging security threats including applicable regulatory security requirements.
Other responsibilities and additional duties as assigned by the SOC Manager.

Key Skills:
Preferred Information Security professional designations such as CISSP, CISM, CISA.
5+ years previous Security Operations Centre Experience in conducting security investigations.
Experience working in SOC Team responding to incidents and events in  AWS cloud  hosting is essential
Demonstrated skills in digital investigations including computer forensics, network forensics, malware analysis and memory analysis.
Working knowledge of EDR preferably Carbon Black
Ability to analyse data, such as logs or packets captures, from various sources within the enterprise and draw conclusions regarding past and future security incidents.
Detail oriented with strong organisational and analytical skills.
Strong written communication skills and presentation skills
Self-starter, work independently and adjust to changing priorities, critical and strategic thinker, negotiator, and consensus builder.
Strong knowledge of IT including multiple operating systems and system administration skills (Windows, Solaris, Unix)
Basic knowledge of client-server applications, multi-tier web applications, relational databases, firewalls, VPNs, and enterprise Anti-Virus products.
Strong understanding of security incident management, malware management and vulnerability management processes.
Security monitoring experience using SIEM, Splunk level 2 and intrusion detection and prevention technologies.
Experience with web content filtering technology - policy engineering and troubleshooting.

What we offer you:

Our people are at the heart of our business. We work hard to provide a rich employee experience and a robust framework for ongoing career development. 
Competitive salary and employee benefits scheme.
Flexible working hours, we value work-life balance.
Parental (including secondary) leave policy.
Cab facility available in Delhi/NCR.
Meal facility available

About Bravura Solutions
At Bravura Solutions, collaboration, diversity and excellence matter. We value your ideas, giving you room to be curious and innovate in an exciting, fast-paced, and flexible environment. 
As a market leader and ASX 200 company, we are a trusted partner to over 350 leading financial services clients. We invest significantly in our technology hubs and innovation labs, which inspire and drive our creative, future-focused mindset. We take pride in developing cutting-edge technology solutions that support our clients to achieve financial security and prosperity for their customers.

How to apply?
If you are interested in joining an ASX listed fintech powering the world’s leading financial institutions, we would love to hear from you so apply online today. 
Please note, as part of the job application process, you will be taken to Bravura Solutions’ careers portal. We don’t always work to fixed closing dates and will consider candidates as and when they apply.