7.0 years

22 - 25 Lacs

Gurgaon

Posted:1 week ago| Platform:

Apply Now

Skills Required

cybersecurity cutting mentoring tuning monitoring analysis security siem networks analyze drive reports cortex splunk qradar data scripting automation python powershell ids tcp ip network communication

Work Mode

On-site

Job Type

Full Time

Job Description

Designation: SOC analyst L3 Experience: 7-15 Year Office Location: Sector 18, Gurugram Job Type: Full-time Job Summary: We are seeking an experienced and proactive SOC Analyst Level 3 to join our cybersecurity operations team. As a senior member of the Blue Team, you will lead threat detection, incident response, and threat hunting efforts using cutting-edge tools including SOAR and XDR platforms. You will also play a key role in mentoring junior analysts, fine-tuning detection mechanisms, and developing automated playbooks. Key Responsibilities: * Lead real-time monitoring and analysis of security events from various sources (XDR, SIEM, SOAR, etc.). * Coordinate and perform advanced threat hunting across endpoints, networks, and cloud environments. * Analyze alerts and incidents to identify false positives and true threats. * Manage and develop SOAR playbooks to improve response times and incident handling. * Correlate threat intelligence with internal events to identify potential risks. * Drive incident response efforts, including containment, eradication, and recovery. * Collaborate with cross-functional teams to remediate vulnerabilities and prevent recurrence. * Perform forensic analysis as part of post-incident review and root cause analysis. * Mentor and train SOC Level 1 and 2 analysts. * Maintain and optimize detection rules and signatures in XDR and SIEM platforms. * Document investigation findings, incident reports, and threat hunting activities. Required Skills & Qualifications: * 7+ years of experience in Security Operations, Incident Response, or Cyber Threat Detection. * Deep understanding of Blue Team methodologies and defense-in-depth strategies. * Hands-on experience with SOAR platforms (e.g., Cortex XSOAR, Splunk SOAR, or similar). * Strong experience with XDR solutions (e.g., Palo Alto Cortex XDR, Microsoft Defender XDR, SentinelOne). * Advanced threat hunting techniques using both manual and automated approaches. * Proficient in using SIEM tools (Splunk, QRadar, or similar) and correlating log data from multiple sources. * Knowledge of MITRE ATT&CK framework and its application in threat detection and response. * Strong scripting and automation skills (Python, PowerShell, etc.) for SOAR and data parsing. * Familiarity with EDR, NDR, IDS/IPS, and endpoint forensic tools. * Solid understanding of TCP/IP, network protocols, and operating system internals (Windows, Linux). * Excellent communication and analytical skills. Job Type: Full-time Pay: ₹2,200,000.00 - ₹2,500,000.00 per year Schedule: Day shift Night shift Work Location: In person

Bridgexcel innovations pvt ltd
Not specified
No locations

7 Jobs

RecommendedJobs for You