FlexHired LogoFlexHired
Logo of Rackspace

Rackspace

SOC Analyst L2 (Sentinel is mandatory)

Job Summary

The role involves detecting, analyzing, and responding to security threats across on-premises and multi-cloud environments, with a focus on incident triage and threat validation. The analyst will manage platform health, create runbooks, monitor trends, and conduct threat hunting using threat intelligence platforms. Candidates should have experience in cloud security tools, incident handling, and automation, with excellent communication skills. The position requires working in a rotational shift and collaborating closely with stakeholders on security and incident response activities.

Required Skills

Automation
Threat Intelligence
Network Security
Incident Response
Security Operations
Vulnerability Analysis
Threat Hunting
Log Analysis
Security Monitoring
Malware Analysis
Threat Detection
Email Security
Platform Management
Web Application Firewall (WAF)
Risk Identification
Firewall Security
Data Loss Prevention (DLP)
Intrusion Detection and Prevention
Security Standards (NIST, ISO27001, CIS, OWASP)
Scripting (Python, Bash, Powershell, etc.)
DevOps Practices (CI/CD, Azure DevOps, Jenkins)
Cloud Security Tools (GCP, AWS, Azure)

Benefits

Learning and Development
Collaborative team environment
Progressive Career Opportunities
Work in Cloud Environments

Job Description

About Rackspace Cyber Defence

Rackspace Cyber Defence is our next generation cyber defence and security operations capability that builds on 20+ years of securing customer environments to deliver proactive, risk-based, threat-informed and intelligence driven security services.

Our purpose is to enable our customers to defend against the evolving threat landscape across on-premises, private cloud, public cloud and multi-cloud workloads.

Our goal is to go beyond traditional security controls to deliver cloud-native, DevOps-centric and fully integrated 24x7x365 cyber defence capabilities that deliver aproactive,threat-informed,risk-based,intelligence-driven approach to detecting and responding to threats.

Our mission is to help our customers:

Proactively detect and respond to cyber-attacks – 24x7x365.

Defend against new and emerging risks that impact their business.

Reduce their attack surface across private cloud, hybrid cloud, public cloud, and multi-cloud environments.

Reduce their exposure to risks that impact their identity and brand.

Develop operational resilience.

Maintain compliance with legal, regulatory and compliance obligations.




What we’re looking for
  • To support our continued success and deliver a Fanatical Experience™ to our customers, Rackspace Cyber Defence is looking for an Indian based Security Operations Analyst(L2) to support Rackspace’s strategic customers.
  • This role is particularly well-suited to a self-starting, experienced and motivated Sec Ops Analyst, who has a proven record of accomplishment in the cloud security monitoring and incident detection domain.
  • As a Security Operations Analyst(L2), you will be responsible for detecting, analysing, and responding to threats posed across customer on-premises, private cloud, public cloud, and multi-cloud environments.
  • The primary focus will be on triaging alerts and events (incident detection), which may indicate malicious activity, and determining if threats are real or not. You will also be required to liaise closely with the customer’s key stakeholders, which may include incident response and disaster recovery teams as well as information security.


Key Accountabilities
  • Should have experience of 4-7years in SOC.
  • Ensure the Customer’s operational and production environment remains secure at all the times and any threats are raised and addressed in a timely manner.
  • Critical incident analysis & validation
  • Platform management tasks like checking the health status and basic troubleshooting.
  • Create new runbooks, playbooks and knowledgebase documents.
  • Trend monitoring & analysis
  • Threat and vulnerability impact analysis
  • Reactive discovery of adversaries based on threat advisory or intelligence reports.
  • Compliance reporting
  • Onboarding of log sources
  • Rule and dashboard enhancements
  • Basic threat hunting
  • Created and manage the watchlists.
  • Handling escalations from L1 Analysts
  • Review the L1 handled Incident and prepare individual scorecards.
  • Prepare and review the weekly and monthly reports.
  • Co-ordinate with vendor for issue resolution
  • Use of threat intelligence platforms such as OSINT, to understand latest threats. Researching and analysing the latest threats to better understand an adversary’s tactics, techniques, and procedures (TTPs).
  • Automation of security processes and procedures to enhance and streamline monitoring capabilities.
  • Ensure all Zero Day vulnerabilities are resolved within agreed SLA (Service Level Agreement) periods by respective teams which was reported by L2 Analyst team.
  • Maintain close working relationships with relevant teams and individual key stakeholders, such as incident response and disaster recovery teams as well as information security etc.
  • Required to work in 24/7 Rotational shift.


Skills & Experience
  • Existing experience as a Security Operations Analyst, or equivalent.
  • Experience of working in large scale, public cloud environments and with using cloud native security monitoring tools such as: -
  • Microsoft Sentinel
  • Microsoft 365 Defender
  • Microsoft Defender for Cloud
  • Endpoint Detection & Response (EDR) tools such as Crowdstrike, Microsoft Defender for Endpoint.
  • Firewalls and network security tools such as Palo Alto, Fortinet, Juniper, and Cisco.
  • Web Application Firewall (WAF) tools such as Cloudflare, Akamai and Azure WAF.
  • Email Security tools such as Proofpoint, Mimecast and Microsoft Defender for Office
  • Data Loss Prevention (DLP) tools such as Microsoft Purview, McAfee and Symantec
  • Nice to have skills/experience includes:
  • Google Cloud Platform (GCP) security tools such as Chronicle and Security Command Centre
  • Amazon Web Services (AWS) security tools such as Security Hub, AWS Guard Duty, AWS Macie, AWS Config and AWS CloudTrail
  • Experience of analysing malware and email headers, and has skills in network security, intrusion detection and prevention systems; operating systems; risk identification and analysis; threat identification and analysis and log analysis.
  • Experience of security controls, such as network access controls; identity, authentication, and access management controls (IAAM); and intrusion detection and prevention controls.
  • Knowledge of security standards (good practice) such as NIST, ISO27001, CIS (Center for Internet Security), OWASP and Cloud Controls Matrix (CCM) etc.
  • Knowledge of scripting and coding with languages such as Terraform, python, javascript, golang, bash and/or powershell.
  • Knowledge of DevOps practices such as CI/CD, Azure DevOps, CircleCI, GitHub Actions, Ansible and/or Jenkins.
  • Computer science, engineering, or information technology related degree (although not a strict requirement)
  • Holds one, or more, of the following certificates (or equivalent): -
  • Certified Information Security Systems Professional (CISSP)
  • Microsoft Certified: Azure Security Engineer Associate (AZ500)
  • Microsoft Certified: Security Operations Analyst Associate (SC-200)
  • CREST Practitioner Intrusion Analyst (CPIA)
  • CREST Registered Intrusion Analyst (CRIA)
  • CREST Certified Network Intrusion Analyst (CCNIA)
  • Systems Security Certified Practitioner (SSCP)
  • Certified Cloud Security Professional (CCSP)
  • GIAC Certified Incident Handler (GCIH)GIAC
  • Security Operations Certified (GSOC)
  • A highly self-motivated and proactive individual who wants to learn and grow and has an attention to detail.
  • A great analyser, trouble-shooter and problem solver who understands security operations, programming languages and security architecture.
  • Highly organised and detail oriented. Ability to prioritise, multitask and work under pressure.
  • An individual who shows a willingness to go beyond in delighting the customer.
  • A good communicator who can explain security concepts to both technical and non-technical audiences.



Interested in this job?

Application deadline: Open until filled

Logo of Rackspace

Rackspace

As a cloud computing services pioneer, we deliver proven multicloud solutions across your apps, data, and security. Maximize the benefits of modern cloud.

See more jobs
Date PostedMay 15th, 2024
Job TypeFull Time
LocationRemote - India - Gurgaon
SalaryCompetitive rates
Exciting remote opportunity (requires residency in India) for a SOC Analyst L2 (Sentinel is mandatory) at Rackspace. Offering competitive salary (full time). Explore more remote jobs on FlexHired!

Safe Remote Job Search Tips

Verify Employer Thoroughly

Research the company's identity thoroughly before applying. Check for a professional website with contacts, active social media, and LinkedIn profiles. Verify details across platforms and look for reviews on Glassdoor or Trustpilot to confirm legitimacy.

Never Pay to Get a Job

Legitimate employers never require payment for applications, training, background checks, or equipment. Always reject upfront payment requests or demands for bank details, even if they claim it's for purchasing necessary work gear on your behalf.

Safeguard Your Personal Information

Protect sensitive data like SSN, bank details, or ID copies. Share this only after accepting a formal, written job offer. Ensure it's submitted via a secure company system or portal, never through insecure channels like standard email attachments.

Scrutinize Communication & Interviews

Watch for communication red flags: poor grammar, generic emails (@gmail), vague details, or undue pressure. Be highly suspicious of interviews held only via text or chat apps; legitimate companies typically use video or phone calls.

Beware of Unrealistic Offers

If an offer's salary or benefits seem unrealistically high for the work involved, be cautious. Research standard pay for similar roles. Offers that appear 'too good to be true' are often scams designed to lure you into providing information or payment.

Insist on a Formal Contract

Always secure and review a formal, written job offer or employment contract before starting work or sharing final personal details. Ensure it clearly defines your role, compensation, key terms, and conditions to avoid misunderstandings or scams.

Subscribe Newsletter

Never miss a remote job opportunity. Subscribe to our newsletter today and receive exclusive job alerts, career advice, and industry insights delivered straight to your inbox.