Soc Analyst 3

5 - 10 years

12 - 22 Lacs

Navi Mumbai, Mumbai, Mumbai (All Areas)

Posted:2 months ago| Platform: Naukri logo

Apply

Skills Required

Incident Response SOC SIEM Malware Analysis Arcsight Phishing Crowdstrike Siem Tools Ransomware Splunk

Work Mode

Work from Office

Job Type

Full Time

Job Description

Role Overview: Position: L3 SOC Analyst Location: Mumbai, India Experience: 5-8 years in SOC roles, with a strong focus on Incident Response and Threat Hunting. Key Responsibilities: Incident Response: Deep expertise in handling end-to-end incident response detection, investigation, containment, eradication, and recovery. Attack Vectors: Solid understanding of phishing, malware, ransomware , and how to respond effectively to these threats. Cyber Kill Chain: Strong knowledge of the cyber kill chain framework, including how adversaries progress through the stages of an attack. Adversary Tactics: Familiarity with adversary techniques and tactics, particularly using frameworks such as MITRE ATT&CK to mitigate threats. SIEM & EDR Tools: Extensive experience with SIEM tools like Splunk and ArcSight , and EDR solutions like CrowdStrike or Microsoft Defender . Scenario Handling: Capable of tackling complex, scenario-based challenges with a strategic mindset. Preferred Qualifications: 3-7 years of experience working in a SOC or handling Incident Response . Expertise in detecting and analyzing indicators of compromise (IOCs). Strong L2 or L3 analyst experience is a must A candidate who has worked on critical incidents and has an in-depth knowledge about the same

Mock Interview

Practice Video Interview with JobPe AI

Start Incident Response Interview Now
Allegis Group
Allegis Group

Staffing and Recruiting

Hanover Maryland

10001 Employees

258 Jobs

    Key People

  • Andy Hilger

    President
  • Michele H. Smith

    Chief Financial Officer

RecommendedJobs for You

Navi Mumbai, Mumbai, Mumbai (All Areas)