Join us at Orange Business!
We are a network and digital integrator that understands the entire value chain of the digital world, freeing our customers to focus on the strategic initiatives that shape their business.
Every day, you will collaborate with a team dedicated to providing consistent, sustainable global solutions, no matter where our customers operate. With over 30,000 employees across Asia, the Americas, Africa, and Europe, we offer a dynamic environment to develop and perfect your skills in a field filled with exciting challenges and opportunities.
24*7 cybersoc support to customer
Plan, implement, configure, and migrate market-leading cyber security solutions (Qradar, Sentinel, Arbor, Qualys etc.)
Creation and implementation of new SIEM use cases (correlation rules), fine tuning, DDOS managed object, Qualys solution.
Configuration, onboarding, and parsing of new log sources in SIEM solution, creation of new MO, defining thresholds in DDOS solution, working on malware analysis, mail analysis, Qualys scanning etc.
Classification and investigation of alarms from different threat detection platforms and provision of the processed results to our customers
Assessment of the effects of an attack, taking initial measures and making concrete recommendations for action, improvement of response plans and incident playbooks.
Anomaly and attack pattern detection at all stages of the cyber kill chain
Tool-based and manual threat hunting to detect attacks after zero-day exploits or vulnerabilities with a potentially severe impact on customer environments become known
Creation of security reports based on the security incidents within the reporting period
Creation of reports and dashboards
Ensure adherence to and implementation of best incident response procedures as well as internal and industry standards
Participation in on-call duty to ensure incident response even outside of business hours
Degree / Diploma Holders with Cybersecurity knowledge
Excellent verbal & written communication skills in English language
Good hands-on experience on SIEM tools like Qradar, Sentinel
Knowledge on Microsoft Defender
Knowledge of DDOS service & mitigation methodology
Experience on Incident handling & response
Certification in IBM Qradar SOC Analyst/Administrator, SC-200
Knowledge on Python or any scripting language
Malware investigation and reporting
Forensic investigation of SPAM / Phishing email incidents
Knowledge on Qualys, CrowdStrike will be an added advantage
• Global Opportunities: Work in multi-national teams with opportunity to collaborate with colleagues and customers from all over the world.
• Flexible Work Environment: Flexible working hours and possibility to combine work from office and home (hybrid ways of working).
• Professional Development: training programs and upskilling/re-skilling opportunities.
• Career Growth: Internal growth and mobility opportunities within Orange.
• Caring and Daring Culture: Health and well-being programs and benefits, diversity & inclusion initiatives, CSR and employee connect events.
• Reward Programs: Employee Referral Program, Change Maker Awards.
Software Powered by iCIMS
www.icims.com