Posted:20 hours ago|
Platform:
On-site
Full Time
Job Title: Security Incident Analyst – L3 Location: Gurugram (Client Location) Shift: Rotational Shifts Experience: 5 to 8 Years Notice Period: Immediate to 15 Days CTC: ₹12 – 13 LPA Hiring Partner: Nurture HRM About the Role: We are looking for a skilled and proactive Security Incident Analyst – L3 to join our team at the client site in Gurugram. The ideal candidate will bring strong technical expertise in incident response, threat analysis, and security operations with hands-on experience in advanced security tools. This is a great opportunity for someone who thrives in high-stakes environments and wants to take ownership of complex security challenges. Key Responsibilities: 1. Incident Response and Management Lead the response to high-severity incidents including data breaches, malware outbreaks, and targeted cyber-attacks. Handle escalations from SOC Level 1 and Level 2 analysts and guide containment and remediation activities. 2. Advanced Threat Analysis Conduct deep-dive analysis of security alerts from tools such as SIEM, EDR, firewalls, and network traffic monitoring systems. Classify and prioritize incidents based on potential impact and urgency. 3. Security Tools & Monitoring Administer and fine-tune security tools (SIEM, IDS/IPS, EDR) for enhanced detection and quicker response. Develop and maintain detection use cases, correlation rules, and incident response playbooks. 4. Collaboration & Knowledge Sharing Provide mentorship to L1 and L2 SOC analysts, fostering growth and upskilling within the team. Lead post-incident reviews to identify lessons learned and enhance SOC capabilities. Job Requirements: Certifications (Preferred): GIAC Certified Incident Handler (GCIH) Certified Information Systems Security Professional (CISSP) Other relevant cybersecurity certifications Experience: Minimum 5 years in a Security Operations Center (SOC) or Incident Response role. Must have experience in SIEM administration and tuning. Technical Skills: Strong knowledge in network, endpoint, cloud, and application security. In-depth experience in incident detection, investigation, and containment. Proficiency with SIEM platforms (preferably QRadar, Splunk). Experience with EDR tools (e.g., CrowdStrike, Carbon Black), IDS/IPS, and firewalls. Familiarity with threat intelligence sources (OSINT, commercial feeds). Ability to correlate threat intelligence with incidents and recommend preventive measures. Qualifications: Bachelor's degree in Computer Science, Cybersecurity, or a related discipline. To Apply: Interested candidates can share their updated resume at recruitment@nurturehrm.com Job Type: Full-time Pay: ₹1,200,000.00 - ₹1,300,000.00 per year Schedule: Day shift Work Location: In person
NurtureHRM
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
12.0 - 13.0 Lacs P.A.
12.0 - 13.0 Lacs P.A.