Job Title: Security Incident Analyst- L3Location: GurugramShift: Rotational ShiftsExperience: 5+ Years Position Summary:A Security Incident Analyst L3 is typically responsible for handling the most complex and severe security incidents and vulnerabilities. The role requires a deeper level of expertise and experience in security operations, incident response, and technical troubleshooting.Key ResponsibilitiesIncident Response and Management:· Lead the response to high-severity security incidents such as data breaches, malware outbreaks, and targeted attacks.· Respond to incidents escalated from SOC Level 1 and Level 2 analysts, providing guidance and expertise for effective containment and remediation.Advanced Threat Analysis:Perform detailed analysis and triage of alerts from security tools such as SIEM (Security Information and Event Management), EDR (Endpoint Detection & Response), firewalls, and network traffic monitoring systems.Security Tools & Monitoring:· Manage and fine-tune security tools (SIEM, IDS/IPS, EDR, etc.) to optimize threat detection and response.· Create, update, and improve security use cases, detection rules, and playbooks for automated incident handling.Collaboration & Knowledge Sharing:· Provide guidance and mentorship to junior SOC analysts (L1 and L2), helping to develop their skills and improve the overall SOC capability.· Lead post-incident reviews (PIR) to evaluate incident response performance and refine processes and procedures. Job Requirements:Certifications:Intermediate to advanced certifications such as GIAC Certified Incident Handler (GCIH), Certified Information Systems Security Professional (CISSP), or equivalent preferred.Experience:Minimum 5 years of experience in a security operations center (SOC) or incident response role with SIEM Admin.Technical Skills:· Expertise in network security, endpoint security, cloud security, and application security.· Extensive experience in cybersecurity and incident response.· Proficiency in using SIEM platforms and security monitoring tools such as QRadar, ArcSight, etc.· Hands-on experience with security tools such as SIEM (Splunk, QRadar, etc.), EDR (CrowdStrike, Carbon Black, etc.), IDS/IPS, and firewalls.· Strong understanding of threat intelligence sources, including open-source intelligence (OSINT) and commercial threat feeds.· Ability to translate threat intelligence into actionable security measures. Soft Skills:Good written & verbal communication & presentation skillsStrong leadership and communication skills.Qualifications:Bachelor’s degree in computer science, Cybersecurity, or a related field.Why Join Us?Work with a dedicated team focused on cybersecurity excellence.Gain exposure to cutting-edge cybersecurity technologies and projects.Contribute to high-impact projects that protect critical infrastructure.Enjoy a collaborative and supportive work culture focused on professional growth.Important Note:This is not a work-from-home opportunity. The selected candidate will be required to work from the office.
Job Title
SOC Analyst L3