In line with our ITIL based processes and organization, you will be in charge to follow Orange internal processes and manage:-
Incident management
– handle both re-active (customer call) and pro-active (monitoring) incidents
– troubleshoot and fix all incidents in close relationship with all people involved in the fault resolution process
– help to provide root cause analysis (RCA) to customers
Security Incident and Event Management
– monitor and respond to alarms and alerts from the SIEM and Crowd strike solutions (triage / notification / recommendation / etc …)
– working closely with Technical Operations Owners / Security Managers and with the customer/customer SOC, to manage incident response coordination and follow-up
about you
Technical Skills
Reviews the latest alerts to determine relevancy and urgency.
Creates new trouble tickets for alerts that signal an incident and require Incident Response review.
Manages and configures security monitoring tools
SIEM (Sentinel) – device integration, Configuration and administration of use cases, managing daly operations of alerts triggered in SIEM etc.
Malware investigation and reporting
Working experience on SOAR solution (Cortex XSOAR).
Forensic investigation of incidents and SPAM / Phising email investigations
Knowledge on Crowd Strike, MS Defender & Ivanti ticketing tool will be an additional advantage.
Knowledge on Firewalls, Load Balancer & different security technology will be helpful in end to end analysis.
department
Global Delivery & Operations
Orange Business manages and integrates the complexity of international communications, freeing our customers to focus on the strategic initiatives that drive their business. Our extensive experience and knowledge in global communication solutions, together with our understanding of multinational business and local support in 166 countries and territories, ensure that our customers receive a consistent, global solution wherever they do business.