Posted:1 day ago|
Platform:
On-site
Full Time
As a Senior SOC Engineer, you will play a pivotal role in enhancing the organization's cybersecurity capabilities by leveraging advanced tools such as Microsoft Sentinel and KQL (Kusto Query Language). Reporting to the SOC Team Lead, you will handle complex security incidents, develop detection mechanisms, and provide mentorship to junior SOC analysts. This role requires deep technical expertise, proactive threat detection skills, and the ability to collaborate effectively with stakeholders to strengthen the organization's overall security posture.
Key Responsibilities:· Serve as a technical escalation point for SOC analysts in resolving complex security incidents.
· Monitor, analyze, and optimize the performance of Microsoft Sentinel and related security tools.
· Conduct advanced threat hunting activities to proactively identify and mitigate potential threats.
· Lead detailed root cause analyses for incidents and recommend remediation strategies.
· Assist in development and refine detection rules, alerts, and dashboards in Microsoft Sentinel to enhance SOC efficiency.
· Collaborate with IT and security teams to integrate new tools and optimize existing SOC workflows.
· Evaluate and implement emerging technologies to improve threat detection and response capabilities.
· Coordinate and manage incident response efforts for critical security events.
· Ensure timely containment, eradication, and recovery during security incidents.
· Document and share lessons learned from security incidents to drive continuous improvement.
· Provide guidance and technical support to junior SOC analysts, fostering their growth and development.
· Conduct training sessions to enhance the team's proficiency in threat detection and analysis.
· Integrate threat intelligence into SOC processes to bolster proactive defense measures.
· Prepare detailed reports on incident trends, security metrics, and recommendations for stakeholders.
Required Skills & Qualifications:· Bachelor’s degree in Computer Science, Information Security, or a related field (or equivalent experience).
· Extensive experience with Microsoft Sentinel, including expertise in KQL (Kusto Query Language).
· Strong knowledge of incident response methodologies, threat hunting, and root cause analysis.
· Proficiency in SIEM tools, cybersecurity principles, and common attack vectors.
· Familiarity with Azure Active Directory, security configurations, and compliance standards.
· Strong analytical and critical-thinking skills.
· Ability to communicate effectively with both technical and non-technical audiences.
· Team-oriented with a focus on mentorship and collaboration.
· Composure and professionalism in high-pressure situations.
· Proven English communication skills supported by professional certifications such as IELTS, TOEIC, or BEC.
· Ability to write technical and executive-level documentation in English, including reports, presentations, and incident summaries.
Experience:
Sanganan IT Solutions Pvt Ltd.
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
noida, uttar pradesh, india
Salary: Not disclosed
navi mumbai
3.0 - 7.0 Lacs P.A.
haryāna
6.86119 - 8.40118 Lacs P.A.
andhra pradesh
Experience: Not specified
Salary: Not disclosed
andhra pradesh, india
Experience: Not specified
Salary: Not disclosed
delhi, delhi, india
Salary: Not disclosed
chennai
5.0 - 9.0 Lacs P.A.
Salary: Not disclosed
Chennai
5.0 - 9.0 Lacs P.A.
maharashtra
Salary: Not disclosed