**SIEM And XDR SOC**Act as a point of escalation for Level 1 and 2 security analysts on incident resolution and containment techniques.- Define, create and maintain SIEM correlation rules, customer build documents, security process and procedures.- Manage, tune, and optimize SIEM tool which includes evaluating existing rules, filters, events and use cases per the business requirement.- Support Log source integration like Active Directory, Office 365, Firewalls- Communicate effectively with customers, teammates, and management.- Prepare Monthly Executive Summary Reports for managed clients and continuously improve their content and presentation.- Provide recommendations in tuning and optimization of security systems, SOC security process, procedures, and policies.**Endpoint Detection and Respond SOC - SentinelOne, Crowd Strike, Microsoft Defender**- Monitoring, analyzing, and detecting security events and incidents related to endpoints- Manage, tune, and optimize EDR tool which includes evaluating existing rules.**Required Experience**- More than 5 years of experience in the information security field.- Well versed with Security operations, SIEM, EDR, Intrusion detection and incident handling- Security monitoring experience with one or more SIEM technologies - FortiSEIM, LogRhythm, Rapid7, Splunk, Elastic- Should have experience in Developing new SIEM correlation rules & Parser writing- Strong team player and ability to work in a challenging and constantly changing environment.- Strong customer service focus with an understanding of client expectations.- Knowledge of current and emerging technologies and processes used within a SOC to improve efficiency and effectiveness.- Strong communication, writing and interpersonal skills. Strong leadership skills with the ability with the ability to prioritize and execute in a methodical and disciplined manner,***Experience**:- SIEM/XDR: 2 years (required)- EDR: 1 year (required)**Language**:- English (required)Work Location: Remote