L2 Security Operation Analyst

3 - 6 years

0 Lacs

Posted:3 days ago| Platform: Linkedin logo

Apply

Work Mode

On-site

Job Type

Full Time

Job Description

We are looking for a proactive and experienced L2 Security Operations Analyst to strengthen our Security Operations Centre (SOC) team. This role will be responsible for detecting, analysing, and responding to cybersecurity incidents in a hybrid infrastructure comprising AWS Cloud, on-prem infrastructure, and diverse endpoint systems including Linux, Windows, and macOS. The candidate should have hands-on experience with SIEM, EDR, firewalls, and cloud-native security tools, along with a solid understanding of threat landscapes and incident response processes.

Responsibilities

  • Act as the first level of the escalation point to the L1 team and investigate, validate, and escalate security alerts received from SIEM and other monitoring tools.
  • Monitor and analyse security events from various sources, including CNAPP, SIEM, EDR, firewalls, AWS CloudTrail, Guard Duty, and endpoint logs.
  • Triage security alerts and escalate incidents based on severity and impact.
  • Correlate data across sources to identify patterns of malicious activity and potential breaches.
  • Review and refine detection use cases and rule tuning to reduce false positives.
  • Update and maintain incident response runbooks and knowledge base.
  • Assist in the development of automation using SOAR platforms for repetitive tasks.
  • Document incidents, root cause analysis, and lessons learned in a structured and timely manner.
  • Provide regular status reports and metrics to SOC leads and management.
  • Collaborate with infrastructure, application, and IT teams for investigation and remediation.

Requirements

  • Bachelor's degree in information security, Computer Science, or related field.
  • 3-6 years of experience in a SOC or cybersecurity operations role.
  • Proficiency with SIEM tools (e. g., Sentinel, Splunk).
  • Hands-on experience with EDR/XDR platforms (e. g., CrowdStrike, Sentinel One).
  • Strong understanding of network protocols, operating systems, malware analysis, and threat actor behaviour.
  • Familiarity with frameworks such as MITRE ATT& CK, NIST CSF,
  • Incident response and investigation skills, including log analysis and packet inspection.
  • Experience with ticketing systems and incident tracking tools.
This job was posted by Debapti Roy from mPokket.

Mock Interview

Practice Video Interview with JobPe AI

Start Job-Specific Interview
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

coding practice

Enhance Your Skills

Practice coding challenges to boost your skills

Start Practicing Now

RecommendedJobs for You