Posted:5 days ago| Platform: Linkedin logo

Apply

Work Mode

On-site

Job Type

Full Time

Job Description

SOC Expert

 

Key Responsibilities:

  • SOC Setup & Management:

     
  • Design and implement 

    SOC procedures

     for proactive security threat detection. 
  • Establish 

    log pipelines

     for structured event correlation across multiple security layers. 
  • Maintain 

    SIEM configurations

     to optimize event logging, analysis, and alerting. 
  • ManageEngine Log360 Configuration:

     
  • Configure 

    ManageEngine Log360

     to monitor security logs, user activities, and access control violations. 
  • Implement 

    event correlation rules

     to detect anomalies and potential threats. 
  • Develop 

    custom dashboards

     for security analytics, reporting, and compliance tracking. 
  • Optimize 

    log ingestion, parsing, and alert mechanisms

     for streamlined SOC operations. 
  • Threat Detection & Incident Response:

     
  • Configure  

    real-time security monitoring

     and analyze event logs for potential threats. 
  • Configure Log360 to issue alert to audience to respond to 

    security incidents

    , performing forensic investigation and remediation. 
  • Define and refine 

    incident response playbooks

     for efficient resolution and mitigation. 
  • Compliance & Risk Management:

     
  • Ensure SOC procedures align with 

    regulatory compliance frameworks

     (e.g., GDPR, ISO 27001, NIST, PCI-DSS). 
  • Implement 

    risk mitigation strategies

     to protect IT infrastructure from evolving threats. 
  • Collaborate with IT and security teams to enhance 

    cyber resilience and data protection

 

Required Skills & Qualifications:

  • Strong expertise in 

    Security Operations Center (SOC) procedures

     and frameworks. 
  • Hands-on experience in 

    ManageEngine Log360 configuration

     and SIEM management. 
  • Proficiency in 

    log pipeline design, event correlation, and incident response

  • Knowledge of 

    network security, access controls, and endpoint protection

  • Familiarity with 

    compliance standards

     such as NIST, ISO 27001, and GDPR. 
  • Ability to design 

    custom threat detection dashboards and security analytics reports

  • Excellent problem-solving, analytical, and documentation skills. 

 

Preferred Qualifications:

  • Certifications

     such as CISSP, CEH, or Security+. 
  • Experience with 

    other security monitoring tools

     like Splunk, QRadar, or ArcSight. 
  • Strong understanding of 

    intrusion detection systems (IDS) and vulnerability assessment techniques

  • Knowledge of 

    cloud security and log monitoring for hybrid environments

  • Graduate degree 
  • Minimum 4 years in the desired profile 


Mock Interview

Practice Video Interview with JobPe AI

Start Job-Specific Interview
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

coding practice

Enhance Your Skills

Practice coding challenges to boost your skills

Start Practicing Now

RecommendedJobs for You