Skip to main content Skip to footer

Security Architect

Security Managed Services Senior Analyst | Full time | Experience: 2-5 years
ジョブ番号 ATCI-5505098-S2014959 | Hyderabad | Required Skill: Security Information and Event Management (SIEM)
応募する
Project Role : Security Architect
Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations.
Must have skills : Security Information and Event Management (SIEM)
Good to have skills : NA
Minimum 3 year(s) of experience is required
Educational Qualification : 15 years full time education

Summary:
As a Level 2 SOC Analyst, your role involves deeper investigation of security alerts and confirmed incidents. You will validate escalated events using Sentinal One and Splunk SIEM, enrich them with context, and work closely with L3 analysts to assist in containment and timely remediation. You will also assist in improving detection fidelity and supporting SOAR automation. This role requires deep expertise in detection, investigation, containment, and remediation, as well as collaboration with multiple teams across security, IT, and compliance.

Roles & Responsibilities:
-Alert Triage & Investigation: Experience investigating escalated alerts using SIEM or EDR
-Incident Response and Containment: Take necessary actions to contain, eradicate and recover from security incidents.
-Identify opportunities for automation and work with SIEM Platform Support team for implementing it.
-EDR Deep Dive: Using Real Time Response (RTR), Threat Graph, custom IOA rules
-Proficiency in writing SPL queries, dashboards and providing fine tuning opportunities
-Threat Hunting: Behavior-based detection using TTPs
-Good understanding of malware, lateral movement, privilege escalation, and exfiltration patterns
-Threat Intel Integration: Automation of IOC lookups and enrichment flows
-Forensic Skills: Live host forensics, log correlation, malware behavioral analysis
-Good experience in advanced threat detection and incident response
-Proficiency in Sentinal One forensic and incident response capabilities
-Playbook Development/Updation: Able to define, update, and optimize IR playbooks and workflows
-Forensic analysis (memory, file systems, logs)
-Cloud incident handling (AWS, Azure)
-Dashboarding: Advanced visualizations and business-focused metrics in Splunk
-Certifications: Splunk Certified Admin/ES Admin, SC-200, Sentinal One EDR vendor training



Professional & Technical Skills:
-Investigate alerts escalated by L1 to determine scope, impact, and root cause
-Perform in-depth endpoint and network triage using Sentinel One
-Use Sentinel One to perform endpoint analysis and threat validation
-Correlate multiple log sources in Splunk to trace attacker activity
-Execute or verify SOAR playbooks for containment actions (isolate host, disable user)
-Enrich events with asset, identity, and threat intelligence context
-Document investigation workflows, evidence, and final conclusions
-Support L3 during major incidents by performing log or memory triage
-Suggest improvements in alert logic or SOAR workflow to reduce false positives
-Conduct threat research aligned to alert patterns and business context
-Enhance alert fidelity with threat intel and historical context
-Document investigation findings and communicate with stakeholders
-Sentinal One: Custom detections, forensic triage, threat graphs
-Splunk SIEM (core + ES module): Searching Logs, Monitoring and investigating alerts.



Additional Information:
- The candidate should have minimum 3 years of experience in Security Information and Event Management (SIEM).
- This position is based at our Hyderabad office.
- A 15 years full time education is required.
15 years full time education

Hyderabad

雇用機会の均等化に関する声明

アクセンチュアは選考に際し、適用される法令に基づき、応募者を年齢、人種、思想信条、肌の色、宗教、性別、国籍、出生地、民族的起源、障がいの有無、性的指向、性同一性、遺伝情報、婚姻、パートナーの有無、市民権において差別することなく、全ての応募者に対し適用される法令に基づき採用選考を行います。

We work with one shared purpose: to deliver on the promise of technology and human ingenuity. Every day, more than 775,000 of us help our stakeholders continuously reinvent. Together, we drive positive change and deliver value to our clients, partners, shareholders, communities, and each other.

We believe that delivering value requires innovation, and innovation thrives in an inclusive and diverse environment. We actively foster a workplace free from bias, where everyone feels a sense of belonging and is respected and empowered to do their best work.

At Accenture, we see well-being holistically, supporting our people’s physical, mental, and financial health. We also provide opportunities to keep skills relevant through certifications, learning, and diverse work experiences. We’re proud to be consistently recognized as one of the World’s Best Workplaces™.

Join Accenture to work at the heart of change. Visit us at www.accenture.com.

採用職種の紹介

セキュリティの仕事と募集要項:脅威を出し抜く

サイバーセキュリティに関する専門知識とスタートアップのような機動力を武器に、絶えず変化する複雑な脅威環境下で、お客様が安全かつ強靭なビジネスを構築できるよう支援します。

さらに詳しく