10-14 Years
Gurugram
Posted 2 weeks ago

Job Openings

SOC L3 Analyst

Experience

10-14 Years

Location

Gurugram

Job Summary:

We are seeking a highly experienced SOC L3 Analyst to strengthen our Security Operations Center. The ideal candidate will have advanced expertise in monitoring, analyzing, and mitigating cybersecurity threats, as well as managing security tools and mentoring junior analysts. This role involves proactive threat hunting, incident response, and collaboration with cross-functional teams to enhance the organization’s security posture.

Key Responsibilities:

  • Perform advanced monitoring, analysis, and triage of security events using tools like Zscaler, CrowdStrike, SentinelOne, and Symantec PGP.
  • Correlate threat data from multiple sources to identify and assess potential security threats.
  • Lead incident response efforts, including containment, eradication, and recovery of complex security incidents.
  • Conduct root cause analysis and recommend measures to prevent recurrence of incidents.
  • Generate detailed and actionable incident reports for stakeholders.
  • Conduct proactive threat-hunting activities using tools such as CrowdStrike Threat Graph, SentinelOne’s deep visibility, and Zscaler logs.
  • Manage and optimize security tools to align with organizational security policies.
  • Deploy and fine-tune Zscaler cloud security solutions and EDR tools like CrowdStrike and SentinelOne.
  • Maintain encryption policies and ensure secure data handling with Symantec PGP.
  • Mentor L1 and L2 analysts, providing training in advanced threat detection and incident response.
  • Collaborate with IT, DevOps, and Compliance teams to improve the organization’s overall security posture.

Qualifications:

  • Minimum of 09 years in a SOC environment, with at least 2 years as an L3 Analyst.
  • Expertise in Zscaler (Cloud Security), CrowdStrike Falcon (EDR), SentinelOne (Endpoint Protection), and Symantec PGP (Encryption).
  • Proficiency in scripting languages such as Python and PowerShell for automation.
  • In-depth knowledge of the MITRE ATT&CK Framework and TTPs (Tactics, Techniques, and Procedures).
  • Strong analytical and problem-solving skills.
  • Excellent communication skills for creating reports and explaining technical issues to non-technical stakeholders.
  • Certified Incident Handler (GCIH).
  • Certified Information Systems Security Professional (CISSP).
  • Certified Ethical Hacker (CEH).
  • Vendor-specific certifications such as Zscaler Certified Administrator (ZCCA), CrowdStrike Certified Professional, or SentinelOne Certified Specialist.

Apply For Job

Job Features

Experience10-14 Years

Apply Online

A valid email address is required.
A valid phone number is required.