Posted:3 days ago|
Platform:
Work from Office
Full Time
The L1, L2 SOC Analyst leads advanced investigations, coordinates major incident responses and performs threat hunting, detection engineering and forensics. This role is also responsible for mentoring junior analysts, refining SOC processes and ensuring continuous improvement of detection and response capabilities.
KRAs
1. Critical Incident Leadership
2. Advanced Threat Detection & Adversary Emulation
3. Proactive Threat Hunting & Hypothesis Testing
4. Digital Forensics (Intermediate to Advanced)
5. SIEM & EDR Content Engineering
multiple SIEMs (Splunk, QRadar, Sentinel, etc.).
6. SOAR & Automation Development
7. Threat Intelligence Fusion
8. Detection & Visibility Gap Management
Security Architecture
Support
configurations.
SIEM, EDR, cloud security deployments.
visibility architecture.
parsing strategies.
10. Customer Facing Technical Leadership
11. Policy, Compliance & Governance Support
12. Tool Evaluation, Customization & Integration
13. Shift Oversight & L2/L1 Mentorship
14. Metrics, Reporting & RCA Documentation
.Generate detection performance metrics (MTTD, MTTR, FP rate, missed attack rate).
15 Scripting & DevSecOps Automation
16 Cloud Security Monitoring
17. MITRE ATT&CK & Threat Modeling
18. Ransomware & APT Readiness
ransomware families (example- Ryuk, Lockbit, etc.).
19. Threat Landscape Intelligence & Briefings
20. Knowledge Management & Documentation
Category Skills / Tools
SIEM Platforms: Splunk, Microsoft Sentinel, QRadar, Elastic SIEM
Endpoint Detection & Response (EDR) CrowdStrike, Defender, SentinelOne, Carbon Black
SOAR & Automation: Cortex XSOAR, Splunk SOAR, Swimlane, ServiceNow
Threat Intelligence Platforms: (TIPs) MISP, Recorded Future, ThreatConnect, Anomali
Forensics & Analysis: Velociraptor, Autopsy, FTK Imager, Wireshark
Network Detection & Monitoring (NDR): Zeek, Suricata, Darktrace, Vectra, Corelight
Cloud Security Monitoring: AWS GuardDuty, Azure Defender, GCP SCC, Wiz
MITRE ATT&CK & Threat Modelling: ATT&CK Navigator, Atomic Red Team, CALDERA
Ticketing / Workflow Systems: ServiceNow, Jira, RTIR, Remedy
Reporting & Dashboarding: Kibana, Power BI, Grafana, Tableau
Scripting & Automation: Python, PowerShell, Bash, APIs, Regex
Data Formats & Parsing: JSON, XML, Syslog, CEF, LEEF
Security Framework Knowledge: MITRE ATT&CK, NIST CSF, ISO 27001, CIS
Soft Skills & Leadership Technical writing, RCA presentation, mentoring
Threat Hunting: Query building, behavioural analytics
Adversary Simulation / Purple Team: Atomic Red Team, Caldera, SCYTHE
Callisto Search
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
greater noida
6.0 - 8.0 Lacs P.A.
20.0 - 25.0 Lacs P.A.
7.0 - 10.0 Lacs P.A.
navi mumbai
16.2 - 18.0 Lacs P.A.
hyderabad
35.0 - 40.0 Lacs P.A.
hyderabad
40.0 - 45.0 Lacs P.A.
5.0 - 7.0 Lacs P.A.
chennai
8.0 - 10.0 Lacs P.A.
hyderabad, chennai, bengaluru
2.0 - 6.0 Lacs P.A.
chennai, bengaluru
30.0 - 30.0 Lacs P.A.