Security Operations Center Analyst

3 years

0 Lacs

Posted:1 week ago| Platform: Linkedin logo

Apply

Work Mode

On-site

Job Type

Contractual

Job Description

About Client:

Our Client is a global IT services company headquartered in Southborough, Massachusetts, USA. Founded in 1996, with a revenue of $1.8B, with 35,000+ associates worldwide, specializes in digital engineering, and IT services company helping clients modernize their technology infrastructure, adopt cloud and AI solutions, and accelerate innovation. It partners with major firms in banking, healthcare, telecom, and media.

Our Client is known for combining deep industry expertise with agile development practices, enabling scalable and cost-effective digital transformation. The company operates in over 50 locations across more than 25 countries, has delivery centers in Asia, Europe, and North America and is backed by Baring Private Equity Asia.

Hi....!

We are hiring for below Positions

Job Title: SOC Sentinel

Key Skills: SOC , Sentinel ,

Job Locations: Kochi

Experience:

Education Qualification

Work Mode:

Employment Type:

Notice Period:

Interview Mode:

SOC Sentinel


Key Responsibilities

Act as an escalation point for high/critical severity incidents and perform thorough investigations.

  • Analyze TTPs (Tools, Techniques, and Procedures) to identify attack vectors and lifecycle stages.
  • Recommend improvements to security controls and organizational security hygiene.
  • Conduct threat hunting and IOC/APT detection through advanced log analysis.
  • Collaborate with clients’ security teams and internal teams for incident resolution and documentation.
  • Identify process gaps and propose enhancements for the incident response lifecycle.
  • Create, maintain, and improve runbooks, playbooks, and incident response processes.
  • Actively participate in war room discussions, executive briefings, and team meetings.

Must-Have Skills

  • Minimum 3+ years of experience as a SOC L3 Analyst in a global SOC environment.
  • Hands-on experience with SIEM tools such as Microsoft Sentinel, including rule writing in KQL and Use Case development.
  • Strong incident response skills and experience writing response procedures and playbooks.
  • Expertise in advanced threat detection, forensic investigation, and root cause analysis.
  • Knowledge of threat hunting techniques and familiarity with attacker TTPs and MITRE ATT&CK framework.
  • Experience with security monitoring, log analysis, and network traffic inspection.
  • Ability to resolve and escalate incidents and provide detailed post-mortem analyses.
  • Excellent communication and documentation skills for cross-functional collaboration.

Good-to-Have Skills

  • Familiarity with Use Case Factory and Managed Detection & Response (MDR) operations.
  • Exposure to various security tools, including EDRs, vulnerability scanners, and SOAR platforms.
  • Experience in training junior analysts and creating knowledge-sharing materials.
  • Prior experience working in global customers/ MSSP environments with multiple customers.

sushma.n@people-prime.com

Mock Interview

Practice Video Interview with JobPe AI

Start Job-Specific Interview
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

coding practice

Enhance Your Skills

Practice coding challenges to boost your skills

Start Practicing Now

RecommendedJobs for You