SOC Analyst (L2/L3, XDR & Threat Hunting)

Cybersechire

a day ago

Expires On04 Oct 2025

3 - 5 years

Work From Office

New Delhi, Delhi, India, India

Security Operations Centre (SOC)

Microsoft Sentinel - SIEM

Google Chronicle

Google Chronicle SEIM

SOAR

Cortex XDR

Cortex XSOAR

Threat Analysis

Threat Hunting

SentinelOne

IBM QRadar

Splunk

Job description & requirements

About the Role

We are seeking skilled SOC Analysts (L2/L3) to join our 24x7 Security Operations Center and help defend enterprise & cloud environments against advanced cyber threats. You will work with next-gen SIEM, XDR, and SOAR tools to detect, analyze, and respond to sophisticated attacks.

Key Responsibilities

  1. Perform real-time monitoring, analysis, and triage of security alerts from SIEM, EDR/XDR, NDR, and cloud security tools.
  2. Conduct threat hunting activities using advanced analytics, threat intelligence, and adversary TTPs (MITRE ATT&CK).
  3. Lead incident response (IR) – containment, eradication, recovery, and RCA.
  4. Develop detection use cases, correlation rules, and dashboards in SIEM/XDR platforms.
  5. Automate repetitive SOC tasks using SOAR playbooks, Python scripts, or PowerShell.
  6. Collaborate with red teams and participate in Purple Team exercises.
  7. Work on cloud SOC monitoring (AWS GuardDuty, Azure Sentinel, GCP Chronicle).
  8. Ensure compliance with ISO 27001, PCI DSS, RBI, GDPR security requirements.

Required Skills & Experience

  1. 3–7 years of experience in SOC operations, Threat Hunting, or Incident Response.
  2. Strong knowledge of SIEM platforms (Splunk, QRadar, Sentinel, Chronicle, Elastic SIEM).
  3. Hands-on with EDR/XDR (CrowdStrike, SentinelOne, Microsoft Defender, Palo Alto Cortex, Trellix).
  4. Familiarity with network protocols, packet analysis (Wireshark), log analysis, malware analysis basics.
  5. Knowledge of MITRE ATT&CK, Cyber Kill Chain, threat intel feeds (STIX/TAXII).
  6. Good scripting knowledge (Python, PowerShell, Bash) for automation.
  7. Certifications preferred: CEH, SOC Analyst, Splunk, Azure Sentinel, GCIA, GCIH, CCIR, or equivalent.

What We Offer

  1. Opportunity to work with next-gen SOC (SIEM + XDR + SOAR + Threat Hunting).
  2. Exposure to global enterprise & government projects.
  3. Competitive salary & shift allowance.
  4. Certification sponsorship and continuous learning.
  5. Career path to Threat Hunter / SOC Automation / IR Specialist / SOC Manager.

Experience :

3 - 5 years

Job Domain/Function :

Security Operation Center (SOC)

Job Type :

Work From Office

Employment Type :

Full Time

Number Of Position(s) :

1

Educational Qualifications :

Bachelor of Computer Applications, B.Tech / BE / B.Sc. - Information Technology, B.Tech / BE / B.Sc - Computer Science, M.Sc. / M tech - IT/Computer Science, Master of Computer Applications, B.Tech / B.E / B.Sc. - Electronics and Communications Engineering, Diploma in Electronics and Communications Engineering, Other, Post Graduate Diploma in Cyber Security, B.Tech / BE / B.Sc. - Cyber Security, Advanced Diploma in Cyber Defense, M.tech / M.Sc. in Cyber Security

Location 1 :

New Delhi, Delhi, India, New Delhi, Delhi, India

Location 2 :

Gurgaon, Haryana, India, Haryana, India

Location 3 :

Bengaluru, Karnataka, India, Karnataka, India

Location 4 :

Hyderabad, Telangana, India, Telangana, India

Location 5 :

Chennai, Tamil Nadu, India, Tamil Nadu, India

Location 6 :

Pune, Maharashtra, India, Maharashtra, India

Location 7 :

Kolkata, West Bengal, India, West Bengal, India

Create alert for similar jobs

Cybersechire

Cyber Security Advisory, Consulting and Staffing Firm

Benefits & Perks

Job Training