Sr SOC Analyst (4 years experience)

4 years

0 Lacs

Posted:1 day ago| Platform: GlassDoor logo

Apply

Work Mode

On-site

Job Type

Full Time

Job Description

Location: Hyderabad (Madhapur) – Hybrid / Office (preferred)
Job Code: IWSOCSR505
Positions Available: 1
Experience Required: Minimum 4 years in SOC operations
Employment Type: Full-time (FTE)
Role Overview:

As a Senior SOC Analyst you will lead complex incident investigations, drive detection improvements, and serve as a technical escalation point for the SOC. You will mentor junior analysts, own incident post-mortems, and collaborate with Engineering, IT, and Threat Intelligence to improve detection, response, and automation.

Key Responsibilities:
  • Lead triage and end-to-end incident response for high-severity incidents (containment, eradication, recovery).
  • Perform host and network forensics; build timelines and evidence packages for investigations.
  • Design, develop and tune advanced detections (SIEM rules, analytics, Sigma rules, KQL/SPL).
  • Conduct proactive threat hunting and map findings to ATT&CK techniques.
  • Mentor L1/L2 analysts, run tabletop exercises, and keep playbooks/runbooks current.
  • Coordinate cross-team remediation (patching, firewall rules, endpoint isolation) and communicate impact to stakeholders.
  • Contribute to automation/SOAR playbooks to reduce mean-time-to-detect/respond.
  • Produce clear incident reports and threat intelligence summaries for technical and business audiences.
Required Skills & Qualifications:
  • Bachelor’s degree in Computer Science, IT, Cybersecurity, or equivalent experience.
  • Minimum 4 years hands-on SOC experience (SIEM + EDR/XDR + incident response).
  • Strong expertise with SIEM platforms (Wazuh/Splunk/Microsoft Sentinel), EDR tools (Trend Micro, Microsoft Defender, CrowdStrike, Sophos), and log analytics (KQL/SPL/ELK).
  • Experience with host & memory forensics, network forensics, and threat hunting methodologies.
  • Scripting/automation skills (PowerShell, Python, Bash) for tooling and automation.
  • Solid understanding of networking (TCP/IP, DNS, HTTP/S), authentication, and common adversary TTPs.
  • Excellent written and verbal communication; able to present technical findings to leadership.
  • Able to work in shift rotations when required.
Preferred / Certifications:
  • GCIA, GCIH, OSCP, OSCE, or relevant DFIR/hunting certifications.
  • Experience with cloud-native logs and detection (Azure/AWS).
  • Prior experience building SOAR playbooks or detection engineering pipelines.
What we offer:
  • Ownership of critical detection & response responsibilities and opportunity to shape SOC strategy.
  • Support for advanced certifications, training, and conference attendance.
  • Competitive compensation, health benefits, and flexible working options (role-dependent).
How to Apply:

Send your resume to careers@isstechnologies.in with subject line“Sr SOC Analyst — IWSOCSR505”

Mock Interview

Practice Video Interview with JobPe AI

Start Python Interview
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

coding practice

Enhance Your Python Skills

Practice Python coding challenges to boost your skills

Start Practicing Python Now

RecommendedJobs for You