Security Operations Center Analyst | 7 Year+ | Mumbai

7 years

0 Lacs

Posted:3 days ago| Platform: Linkedin logo

Apply

Work Mode

On-site

Job Type

Full Time

Job Description

Job Title: Senior SOC Analyst (L2/L3)

Location: Mumbai, India

Experience Required: 7+ Years

Employment Type: Full-Time


Job Summary:

Senior SOC Analyst


Key Responsibilities:

  • Perform

    real-time security monitoring, analysis, and incident response

    for enterprise systems, networks, and applications.
  • Investigate security alerts and correlate events using

    SIEM tools

    (e.g., Splunk, QRadar, ArcSight, Azure Sentinel).
  • Conduct

    threat hunting, log analysis, and root cause investigations

    for potential or actual incidents.
  • Manage the

    incident response lifecycle

    — triage, containment, eradication, recovery, and post-incident review.
  • Escalate incidents to higher levels (L3 or CSIRT) as per defined playbooks.
  • Develop and tune

    correlation rules, dashboards, and detection use cases

    .
  • Collaborate with IT, network, and application teams to mitigate vulnerabilities.
  • Generate

    incident reports

    , maintain SOC documentation, and contribute to process improvements.
  • Participate in

    security assessments, vulnerability management, and threat intelligence integration

    .
  • Mentor junior analysts (L1/L2) and help strengthen SOC operational maturity.


Required Skills and Qualifications:

  • Bachelor’s degree in Computer Science, Information Security, or related discipline.
  • 7+ years

    of total IT/security experience, with

    minimum 4+ years in SOC operations

    .
  • Proficient in

    SIEM platforms

    such as Splunk, IBM QRadar, ArcSight, or Azure Sentinel.
  • Strong understanding of

    network protocols, firewalls, proxies, endpoint security, and malware analysis.

  • Expertise in

    incident response, log analysis, and threat intelligence correlation.

  • Familiarity with

    MITRE ATT&CK framework, NIST, and ISO 27001 standards.

  • Experience with

    EDR tools

    (CrowdStrike, Carbon Black, SentinelOne, etc.).
  • Knowledge of

    Windows, Linux, and cloud security (AWS, Azure)

    environments.
  • Excellent analytical thinking, documentation, and communication skills.


Preferred / Good to Have:

  • Certifications:

    CEH, CHFI, CompTIA Security+, GCIA, GCIH, or Splunk Certified Analyst.
  • Experience in

    security automation (SOAR)

    and

    playbook development

    .
  • Exposure to

    threat hunting, forensic analysis, and purple team activities.

Mock Interview

Practice Video Interview with JobPe AI

Start Job-Specific Interview
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

coding practice

Enhance Your Skills

Practice coding challenges to boost your skills

Start Practicing Now

RecommendedJobs for You