Posted:1 month ago| Platform: Linkedin logo

Apply

Work Mode

On-site

Job Type

Full Time

Job Description

Location: Any of the following – Bangalore, Mumbai, Navi Mumbai, Ahmedabad, Chennai, Coimbatore, Gurgaon, Hyderabad, Kochi, Kolkata, Noida, Pune, or ThiruvananthapuramEmployment Type: Full-time (Hybrid model – 3 days in office)Compensation Range: USD 75,000 – 113,000 per annumDomain: Information TechnologyInterview Process: 2 Technical Rounds &1 Client Round

Role Overview

We are seeking an experienced SOC L3 Engineer to join our Global Operations & Delivery Team, responsible for monitoring, investigating, and resolving complex security incidents, violations, and suspicious activities.You will serve as an escalation point for critical incidents, perform in-depth threat hunting, and enhance our clients’ cybersecurity posture using advanced technologies and analytical techniques.

Key Responsibilities

  • Serve as the primary escalation point for high and critical severity security incidents.
  • Conduct detailed investigations to determine potential impact and extent of compromise.
  • Analyze attack patterns, TTPs (Tools, Techniques, and Procedures) to identify attack methods and lifecycle.
  • Provide recommendations for issue resolution, configuration changes, and improvements to security hygiene.
  • Offer guidance to mitigate risks related to identified vulnerabilities.
  • Perform threat hunting for IOCs (Indicators of Compromise) and APTs (Advanced Persistent Threats).
  • Conduct log analysis to identify threats that may have bypassed automated detection tools.
  • Gather and analyze evidence to validate root causes and determine the extent of compromise.
  • Identify process and security gaps; propose enhancements to existing incident response methodologies.

Required Skills & Qualifications

  • Minimum 3+ years of experience as a SOC Level 3 Analyst in a global SOC environment.
  • Proven expertise with SIEM platforms such as QRadar, Microsoft Sentinel, or Splunk.
  • Strong background in incident response, runbook development, and playbook creation.
  • Excellent analytical, investigative, and communication skills.
  • Ability to collaborate effectively with internal IT and cybersecurity teams.
  • Exceptional customer satisfaction and service delivery mindset.

Preferred / Nice To Have

  • Prior experience in penetration testing, forensics, or malware analysis.
  • Familiarity with MITRE ATT&CK Framework or threat intelligence integration.
  • Relevant certifications (e.g., CISSP, CEH, GCIH, GCIA, OSCP, or CompTIA Security+).

Benefits Overview

  • Paid Leave: Minimum 10 vacation days, 6 sick days, and 10 paid holidays annually.
  • Insurance: Medical, dental, and vision coverage for employees and dependents.
  • Retirement Plan: 401(k) plan with employer matching.
  • Additional Benefits:
    • Company-paid life insurance, accidental death & disability, and short/long-term disability coverage.
    • Health Savings Account (HSA) and Flexible Spending Account (FSA) options.
    • Paid bereavement leave and jury duty leave.
    • Compliance with state/local paid sick leave laws.

Mock Interview

Practice Video Interview with JobPe AI

Start Job-Specific Interview
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

coding practice

Enhance Your Skills

Practice coding challenges to boost your skills

Start Practicing Now

RecommendedJobs for You