7 - 12 years

10 - 14 Lacs

Posted:2 weeks ago| Platform: Naukri logo

Apply

Work Mode

Work from Office

Job Type

Full Time

Job Description

Job Description

The SOC L3 Analyst is a senior-level position responsible for handling the most complex security incidents and providing strategic direction for the SOC team. This role involves leading shifts, mentoring junior analysts, and providing strategic oversight to ensure effective detection, analysis, and response to security incidents. The L3 Analyst will leverage expertise in threat intelligence, use case management, and advanced incident response while ensuring all security measures and processes are efficiently implemented across the organization.

2. Responsibilities

Lead the investigation and response to advanced persistent threats (APTs) and complex security incidents.

Develop and manage security use cases, detection rules, and correlations within Azure Microsoft Sentinel or SentinelOne.

Provide strategic guidance and oversight to L1 and L2 analysts during major incidents and escalations.

Lead SOC shifts, ensuring proper coverage and incident management across 24x7 operations.

Ensure that the SOC team follows proper incident response protocols, escalation procedures, and security policies.

Collaborate with threat hunters to identify new attack patterns and improve detection capabilities.

Review and update the organizations incident response plan, conducting tabletop exercises and post-incident reviews.

Conduct threat intelligence research, share insights, and integrate threat intel into operational security processes.

Provide subject matter expertise on incident response, forensic analysis, and threat hunting.

Assist in the management and optimization of SIEM tools, ensuring maximum efficiency and effectiveness.

Work closely with clients and stakeholders to provide incident analysis, reports, and security recommendations.

Generate regular reports on SOC performance, incident trends, and lessons learned.

Lead, mentor, and train L1 and L2 analysts, enhancing team capabilities and expertise.

Ensure shift documentation is properly maintained, and incidents are tracked and reported using Jira/Manage Engine ITSM.

3. Qualifications

Bachelor's degree in computer science, Cybersecurity, or a related field.

5+ years of experience in cybersecurity or information security roles, with a focus on incident response and SIEM management.

Hands-on experience with security platforms like Azure Microsoft Sentinel or SentinelOne.

Experience handling complex security incidents, including APTs, malware, and advanced threats.

Expertise in developing and managing use cases and detection rules within SIEM.

Hinduja Global Solutions Limited

“For internal use only” 1 of 1 HGS-SECURE/MSSP/HGS-UK/PROPOSAL/0001

“Un-controlled if printed”.

Proven experience in leading SOC shifts and managing a 24x7 security operations environment.

Ability to work effectively in a 24x7 shift environment.

4. Certifications

Certifications such as Certified Information Systems Security Professional (CISSP), GIAC Certified Incident Handler (GCIH), or Certified Ethical Hacker (CEH) are required.

Mock Interview

Practice Video Interview with JobPe AI

Start Job-Specific Interview
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

coding practice

Enhance Your Skills

Practice coding challenges to boost your skills

Start Practicing Now
Hinduja Global Solutions (HGS) logo
Hinduja Global Solutions (HGS)

Information Technology and Business Process Management

Malad

RecommendedJobs for You

bengaluru, karnataka, india

thiruvananthapuram, kerala

Pune, Maharashtra, India

Mumbai Suburban, Navi Mumbai, Mumbai (All Areas)