Home
Jobs

Security Incident Analyst- L3

5 - 8 years

12 - 13 Lacs

Posted:20 hours ago| Platform: GlassDoor logo

Apply

Work Mode

On-site

Job Type

Full Time

Job Description

Job Title: Security Incident Analyst – L3 Location: Gurugram (Client Location) Shift: Rotational Shifts Experience: 5 to 8 Years Notice Period: Immediate to 15 Days CTC: ₹12 – 13 LPA Hiring Partner: Nurture HRM About the Role: We are looking for a skilled and proactive Security Incident Analyst – L3 to join our team at the client site in Gurugram. The ideal candidate will bring strong technical expertise in incident response, threat analysis, and security operations with hands-on experience in advanced security tools. This is a great opportunity for someone who thrives in high-stakes environments and wants to take ownership of complex security challenges. Key Responsibilities: 1. Incident Response and Management Lead the response to high-severity incidents including data breaches, malware outbreaks, and targeted cyber-attacks. Handle escalations from SOC Level 1 and Level 2 analysts and guide containment and remediation activities. 2. Advanced Threat Analysis Conduct deep-dive analysis of security alerts from tools such as SIEM, EDR, firewalls, and network traffic monitoring systems. Classify and prioritize incidents based on potential impact and urgency. 3. Security Tools & Monitoring Administer and fine-tune security tools (SIEM, IDS/IPS, EDR) for enhanced detection and quicker response. Develop and maintain detection use cases, correlation rules, and incident response playbooks. 4. Collaboration & Knowledge Sharing Provide mentorship to L1 and L2 SOC analysts, fostering growth and upskilling within the team. Lead post-incident reviews to identify lessons learned and enhance SOC capabilities. Job Requirements: Certifications (Preferred): GIAC Certified Incident Handler (GCIH) Certified Information Systems Security Professional (CISSP) Other relevant cybersecurity certifications Experience: Minimum 5 years in a Security Operations Center (SOC) or Incident Response role. Must have experience in SIEM administration and tuning. Technical Skills: Strong knowledge in network, endpoint, cloud, and application security. In-depth experience in incident detection, investigation, and containment. Proficiency with SIEM platforms (preferably QRadar, Splunk). Experience with EDR tools (e.g., CrowdStrike, Carbon Black), IDS/IPS, and firewalls. Familiarity with threat intelligence sources (OSINT, commercial feeds). Ability to correlate threat intelligence with incidents and recommend preventive measures. Qualifications: Bachelor's degree in Computer Science, Cybersecurity, or a related discipline. To Apply: Interested candidates can share their updated resume at recruitment@nurturehrm.com Job Type: Full-time Pay: ₹1,200,000.00 - ₹1,300,000.00 per year Schedule: Day shift Work Location: In person

Mock Interview

Practice Video Interview with JobPe AI

Start Security Interview Now
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

coding practice

Enhance Your Skills

Practice coding challenges to boost your skills

Start Practicing Now
NurtureHRM

10 Jobs

RecommendedJobs for You