SOC Analyst - Greater Noida

4 - 6 years

6 - 8 Lacs

Posted:3 days ago| Platform: Naukri logo

Apply

Work Mode

Work from Office

Job Type

Full Time

Job Description

The L1, L2 SOC Analyst leads advanced investigations, coordinates major incident responses and performs threat hunting, detection engineering and forensics. This role is also responsible for mentoring junior analysts, refining SOC processes and ensuring continuous improvement of detection and response capabilities.

KRAs

1. Critical Incident Leadership

  • Lead full lifecycle of P1/P2 incidents across customer environments.
  • Act as Incident Commander coordinating SOC, client, legal and business units.
  • Guide containment, eradication and recovery efforts.
  • Own timeline, documentation and RCA for major breaches.

2. Advanced Threat Detection & Adversary Emulation

  • Develop complex detection logic/use cases for evolving threats (APT, ransomware, 0-days).
  • Perform detection gap analysis using MITRE ATT&CK.
  • Work with Red Team to simulate adversarial behaviour and tune detections accordingly.

3. Proactive Threat Hunting & Hypothesis Testing

  • Plan and execute strategic, hypothesis driven threat hunts.
  • Build detection artifacts from telemetry (Windows logs, DNS, Proxy, EDR, cloud, etc.).
  • Document hunt assumptions, queries, outcomes and recommendations.
  • Automate repeated hunts using scripting or SOAR.

4. Digital Forensics (Intermediate to Advanced)

  • Extract and analyse endpoint/memory/disk/network artifacts.
  • Perform timeline analysis, file carving, binary inspection and log correlation.
  • Support or lead forensic investigations in collaboration with DFIR teams.
  • Preserve evidence per legal and chain of custody standards.

5. SIEM & EDR Content Engineering

  • Author and optimize correlation rules across

multiple SIEMs (Splunk, QRadar, Sentinel, etc.).

  • Write and maintain threat detection rules (KQL, SPL, Sigma, AQL, etc.).
  • Develop parsers, normalization logic, dashboards and data models.
  • Tune rules to reduce false positives while maintaining efficacy.

6. SOAR & Automation Development

  • Architect advanced SOAR playbooks for IR, enrichment and notification.
  • Write custom integrations using APIs or scripts (Python, PowerShell).
  • Work with DevSecOps teams to expand automation coverage.
  • Validate automated actions comply with customer SOPs and SLAs.

7. Threat Intelligence Fusion

  • Ingest and operationalize IOC, TTP and threat actor data from TI feeds (commercial + OSINT).
  • Create enriched detection content using threat intel.
  • Profile threat actors impacting customers and track campaigns.
  • Recommend strategic threat mitigations based on actor behaviours.

8. Detection & Visibility Gap Management

  • Maintain matrix of covered vs uncovered attack techniques.
  • Recommend log source onboarding for visibility improvement.
  • Track telemetry coverage per customer and per data source.
  • Maintain detection backlog based on threat landscape.

Security Architecture

Support

  • Guide customers on optimal log source

configurations.

  • Provide detection engineering input during

SIEM, EDR, cloud security deployments.

  • Review and advise on network and endpoint

visibility architecture.

  • Recommend sensor placement, retention,

parsing strategies.

10. Customer Facing Technical Leadership

  • Participate in high profile incident calls with customer security teams and executives.
  • Present RCA findings, containment status and future recommendations.
  • Customize threat detection based on customer assets, regulatory needs and threat models.
  • Attend monthly or quarterly review meetings as SME.

11. Policy, Compliance & Governance Support

  • Map detections to compliance needs (e.g., ISO 27001, PCI DSS, NIST 800-53).
  • Create incident documentation suitable for audits.
  • Guide clients on SOC2 readiness, log retention, SIEM evidence practices.
  • Support regulator mandated reporting and breach notifications.

12. Tool Evaluation, Customization & Integration

  • Evaluate new tools: EDR, NDR, SOAR, UEBA, sandbox, threat intel.
  • Recommend based on detection maturity and integration capability.
  • Develop custom scripts, queries or API integrations.
  • Participate in POC testing and ROI analysis.

13. Shift Oversight & L2/L1 Mentorship

  • Act as escalation lead for complex investigations.
  • Review L2 work for quality, completeness and accuracy.
  • Mentor junior analysts, deliver training and coaching.
  • Approve playbooks, rule updates and escalation paths.
  • Maintain escalation documentation and shift SOPs.

14. Metrics, Reporting & RCA Documentation

.Generate detection performance metrics (MTTD, MTTR, FP rate, missed attack rate).

  • Document full RCAs, timelines, attack chains and remediation plans.
  • Develop and refine metrics dashboards for SOC leadership and customers.
  • Participate in regular performance and maturity reviews.

15 Scripting & DevSecOps Automation

  • Write scripts and tools to aid triage, data enrichment and detection tuning.
  • Use Python, Bash, PowerShell for custom tooling.
  • Integrate SOAR/SIEM with APIs, DBs, threat intel and asset systems.

16 Cloud Security Monitoring

  • Analyse cloud native logs (AWS CloudTrail, Azure Activity, GCP logs).
  • Implement and monitor cloud specific detections and misconfiguration alerts.
  • Recommend CSPM configuration and visibility improvements.
  • Map cloud events to MITRE ATT&CK (cloud tactics).

17. MITRE ATT&CK & Threat Modeling

  • Maintain and evolve ATT&CK Navigator heatmaps for customers.
  • Use ATT&CK to map detection rules and hunting priorities.
  • Track adversary behaviours to improve detection maturity.

18. Ransomware & APT Readiness

  • Develop response guides and detections for

ransomware families (example- Ryuk, Lockbit, etc.).

  • Track APT actor campaigns and IOC sets.
  • Lead tabletop exercises for ransomware/Apt preparedness.

19. Threat Landscape Intelligence & Briefings

  • Provide monthly/quarterly customer specific threat briefings.
  • Summarize threat trends and emerging attacker TTPs.
  • Recommend defences aligned with risk profile and industry.

20. Knowledge Management & Documentation

  • Contribute to internal runbooks, SOPs, playbooks and threat reports.
  • Maintain shared knowledge base for advanced attacks.
  • Update IR templates, hunt notebooks and detection libraries.

Category Skills / Tools

SIEM Platforms: Splunk, Microsoft Sentinel, QRadar, Elastic SIEM

Endpoint Detection & Response (EDR) CrowdStrike, Defender, SentinelOne, Carbon Black

SOAR & Automation: Cortex XSOAR, Splunk SOAR, Swimlane, ServiceNow

Threat Intelligence Platforms: (TIPs) MISP, Recorded Future, ThreatConnect, Anomali

Forensics & Analysis: Velociraptor, Autopsy, FTK Imager, Wireshark

Network Detection & Monitoring (NDR): Zeek, Suricata, Darktrace, Vectra, Corelight

Cloud Security Monitoring: AWS GuardDuty, Azure Defender, GCP SCC, Wiz

MITRE ATT&CK & Threat Modelling: ATT&CK Navigator, Atomic Red Team, CALDERA

Ticketing / Workflow Systems: ServiceNow, Jira, RTIR, Remedy

Reporting & Dashboarding: Kibana, Power BI, Grafana, Tableau

Scripting & Automation: Python, PowerShell, Bash, APIs, Regex

Data Formats & Parsing: JSON, XML, Syslog, CEF, LEEF

Security Framework Knowledge: MITRE ATT&CK, NIST CSF, ISO 27001, CIS

Soft Skills & Leadership Technical writing, RCA presentation, mentoring

Threat Hunting: Query building, behavioural analytics

Adversary Simulation / Purple Team: Atomic Red Team, Caldera, SCYTHE

Mock Interview

Practice Video Interview with JobPe AI

Start Cyber Security Interview
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

coding practice

Enhance Your Skills

Practice coding challenges to boost your skills

Start Practicing Now
Callisto Search logo
Callisto Search

Recruiting/Staffing

Seattle

RecommendedJobs for You

hyderabad, chennai, bengaluru