We are a $13+ billion global technology company, home to more than 224,000 people across 60 countries, delivering industry-leading capabilities centered around digital, engineering, cloud, and AI, powered by a broad portfolio of technology services and products.
HCLTech is a globally recognized leader in the Tech and IT industry, but we’ve never forgotten the startup mindset that got us here. We’ve always approached our work with an idea-first attitude because every one of our accomplishments —no matter how big or small —can be traced back to an idea’s single spark.
It’s that spark —that inner drive —that sets our people apart from our competitors. It enables us not just to pull off game-changing feat after game-changing feat but to better our world in the process. We want you to find your spark. Because that’s what drives you to be better, be more and ultimately, be more fulfilled.
Role- SOC Operations
Location-Coventry, UK
Job Type- Full onsite
Employment Type - Full time employment
Skill Required:
Any one of the 2 SIEMs(Splunk, Microsoft Sentinel, Google Chronicle,PaloAlto XSIAM)
EDR experience in 2 EDRs (SentinelOne, Microsoft XDR, Crowdstrike, PaloAlto XDR)
Job Summary
Perform threat hunting for our customers
Technical Skills:
* Expertise in SIEM/SOAR platforms.
* Strong understanding of MDR, XDR, SIEM and SOAR.
* Proficiency in Kusto Query Language (KQL) for advanced threat hunting.
* Deep knowledge of Windows, macOS, and Linux endpoint security and attack techniques (MITRE ATT&CK framework).
* Experience in forensic investigations and malware analysis.
* Strong scripting and automation skills (PowerShell, Python preferred).
* Familiarity with cloud security (Azure Defender, M365 Defender, Defender for Cloud).
* Should have a strong understanding of various types of threat intelligence
* Should have able to perform IOC as well as Hypothesis based threat hunting
* Should have a good understanding of OS namely Windows, Linux and MAC
* Should have strong understanding of latest threats
* Experience in creating reports for threat hunting based on various KPIs
* Experience in understanding various types of threat intelligence
Soft skills
* Shall have good verbal/written communication skills
* Should be willing to work in 24x7 environments
* From time-to-time travel opportunities may be assigned
* Incumbent should carry continual system improvement mindset and able to demonstrate in work.
* Client facing technical analysis report and presentation skills