Posted:1 day ago|
                                Platform:
                                
                                
                                
                                
                                
                                
                                
                                
                                
                                
                                
                                
                                
                                
                                
                                
                                
                                
                                
                                
                                
                            
Hybrid
Full Time
Conduct in-depth investigation of security incidents including data collection, root cause analysis, and recovery efforts, ensuring compliance with defined SLAs.
Validate and fine-tune correlation rules, use-cases, and custom detections in SIEM tools to reduce false positives and improve detection fidelity.
Propose new SIEM use cases with playbook creation based on threat intelligence, evolving TTPs, or internal security gaps.
Conduct alert quality reviews, enhancing or retiring outdated detection logic and recommending improved strategies.
Provide mentorship and analytical support to L1 analysts, helping them enhance detection and response capabilities.
Continuously monitor SIEM and other security tools for alerts indicating potential threats, policy violations, or anomalies in the network.
Lead incident response activities, focusing on containment and eradication of threats while ensuring forensic integrity for post-event analysis.
Correlate data from various sources to identify security incidents and create actionable intelligence.
Collaborate with cross-functional teams and subject matter experts to resolve complex technical issues swiftly.
Review logs, metrics, and system behavior to identify patterns and early indicators of compromise.
Document incidents, root cause, and resolution steps in a structured manner, and contribute to the refinement of incident response playbooks.
Share security knowledge and threat insights across the team to promote continuous learning and improvement.
Keep leadership informed of high-priority incidents and propose tactical/strategic countermeasures.
Ensure adherence to internal policies, regulatory requirements, and industry best practices throughout all SOC processes.
4+ years of professional experience in Information Security, SOC operations or incident response.
Strong knowledge of cybersecurity frameworks and methodologies including MITRE ATT&CK, Cyber Kill Chain and NIST IR.
God Knowledge in Cloud Security concepts and toolsexperience with EDR, SIEM, and Firewall technologies is a must.
Deep understanding of core network and security principles (Operating systems, TCP/IP, ports, detection/IDS/IPS, etc.).
Working knowledge of malware analysis and sandbox environments.
Ability to interpret complex alerts and logs from diverse sources and translate them into practical response actions.
Excellent communication, documentation, and collaboration skills to interact with stakeholders at all levels.
 
                Deloitte Consulting
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
 
        Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
 
            
         
                        
                    hyderabad
7.0 - 12.0 Lacs P.A.
kolkata metropolitan area, west bengal, india
Salary: Not disclosed
chennai, tamil nadu
0.00016 - 0.00016 Lacs P.A.
6.5 - 12.0 Lacs P.A.
Pune, Maharashtra, India
Salary: Not disclosed
Kolkata, West Bengal, India
Salary: Not disclosed
Bengaluru
13.0 - 15.0 Lacs P.A.