SOC Engineer - L3

8 - 10 years

0 Lacs

Posted:2 months ago| Platform: Linkedin logo

Apply

Work Mode

On-site

Job Type

Full Time

Job Description

SOC Engineer - L3


Location: Hyderabad

Mode: Hybrid


Role Summary

  • Act as the senior-level analyst responsible for handling complex security incidents and advanced threats.
  • Lead investigations, triage escalations from L1/L2 analysts, and coordinate response actions.
  • Serve as the technical expert for SOC operations, threat detection, and remediation. Key Responsibilities.
  • Lead investigation and response for high-severity incidents (P1/P2).
  • Perform root cause analysis and advanced threat hunting.
  • Guide L1/L2 analysts on incident investigation procedures.
  • Coordinate with IT, network, application, and security teams for containment and remediation.
  • Develop and maintain incident response playbooks and standard operating procedures (SOPs).
  • Analyze alerts from SIEM, SOAR, EDR, NDR, WAF, and cloud security tools.
  • Identify patterns, anomalies, and emerging threats using threat intelligence.
  • Conduct malware analysis, phishing investigation, and forensic analysis when required.
  • Integrate threat intelligence into SOC workflows and monitoring systems.
  • Tune SIEM, SOAR, and detection rules for accuracy and efficiency.
  • Develop automation scripts and workflows to reduce manual SOC tasks.
  • Mentor and train L1/L2 analysts on advanced detection techniques.
  • Participate in SOC process improvement initiatives.
  • Provide clear and detailed incident reports to SOC Manager and leadership.
  • Communicate threat impact and resolution status to internal stakeholders.
  • Support audit, compliance, and regulatory reporting requirements.
  • Collaborate with Red Team, Vulnerability Management, and CTI teams.


Qualifications & Skills Education & Certification

  • Bachelors or Masters in Computer Science, Information Security, or related field.
  • Relevant certifications preferred: CISSP, GCIA, GCIH, CEH, OSCP, Splunk/QRadar/Sentinel certs.


Technical Skills Advanced knowledge of:

  • SIEM/SOAR platforms (Splunk, QRadar, Sentinel, etc.)
  • Endpoint detection & response (CrowdStrike, Trellix, Defender, etc.)
  • Network, cloud, and web application security
  • Malware analysis, threat hunting, and forensic investigations
  • Experience with scripting/automation (Python, PowerShell, Bash).
  • Familiarity with MITRE ATT&CK framework and TTP analysis.


Soft Skills:

  • Strong analytical and problem-solving abilities.
  • Ability to work under pressure during critical incidents.
  • Excellent communication and documentation skills.
  • Team mentoring and knowledge-sharing aptitude.


Experience:

  • 8-10 years in cybersecurity operations or SOC environment.
  • At least 2-3 years in advanced incident response or L3 SOC roles.
  • Experience in enterprise SOC or MSSP SOC preferred.

Mock Interview

Practice Video Interview with JobPe AI

Start Python Interview
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

coding practice

Enhance Your Python Skills

Practice Python coding challenges to boost your skills

Start Practicing Python Now
ITC Infotech logo
ITC Infotech

Information Technology and Services

Bengaluru

RecommendedJobs for You

mumbai, maharashtra, india

hyderabad, telangana, india

Mumbai, Maharashtra, India

mumbai, maharashtra, india

hyderabad, telangana, india