Home
Jobs

1 Threat Management Jobs

Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
Filter
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

5.0 - 8.0 years

10 - 13 Lacs

Gurgaon, Haryana, India

On-site

Foundit logo

Position: Security Incident Analyst- L3[SOC- L3] Company: CyberAssure www.cyberassure.one Location: @ Client site - Cyber city ,Gurgaon Experience : 5- 8 yrs + Salary range: 12-13 lacs max. Joining time: ASAP max 30 days Shift: Rotational Shifts Key Responsibilities 1. Incident Response and Management: נLead the response to high-severity security incidents such as data breaches, malware outbreaks, and targeted attacks. נRespond to incidents escalated from SOC Level 1 and Level 2 analysts, providing guidance and expertise for effective containment and remediation. 2. Advanced Threat Analysis: נPerform detailed analysis and triage of alerts from security tools such as SIEM (Security Information and Event Management), EDR (Endpoint Detection & Response), firewalls, and network traffic monitoring systems. 3. Security Tools & Monitoring: נManage and fine-tune security tools (SIEM, IDS/IPS, EDR, etc.) to optimise threat detection and response. נCreate, update, and improve security use cases, detection rules, & playbooks for automated incident handling. 4. Collaboration & Knowledge Sharing: נProvide guidance and mentorship to junior SOC analysts (L1 and L2), helping to develop their skills and improve the overall SOC capability. נLead post-incident reviews (PIR) to evaluate incident response performance , refine processes & procedures. Job Requirements: Certifications: Intermediate to advanced certifications such as GIAC Certified Incident Handler (GCIH), Certified Information Systems Security Professional (CISSP), or equivalent preferred. Experience: Minimum 5 years of experience in a security operations center (SOC) or incident response role . Technical Skills: Expertise in network security, endpoint security, cloud security, and application security. Extensive experience in cybersecurity and incident response. Proficiency in using SIEM platforms and security monitoring tools such as QRadar. Hands-on experience with security tools such as SIEM (Splunk, QRadar, etc.), EDR (CrowdStrike, Carbon Black, etc.), IDS/IPS, and firewalls. Strong understanding of threat intelligence sources, including open-source intelligence (OSINT) and commercial threat feeds. Ability to translate threat intelligence into actionable security measures. Qualifications: Bachelor's degree in computer science, Cybersecurity, or a related field. Share Ur latest C.V. with details like- 1. Ctc 2. Expectation 3. Notice period Regards, Rajesh Kumar AAYAM CONSULTANTS Cell: - 9311232179/ 7011595674 Email id: - [HIDDEN TEXT]

Posted 1 day ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies