Cybersecurity Specialist (SOC L3)

November 19, 2024
Application ends: December 31, 2024
Apply Now

Apply for this job

Upload CV (doc, docx, pdf)

Job Description

๐“๐ž๐š๐ฆ: ๐Œ๐จ๐ง๐ข๐ญ๐จ๐ซ๐ข๐ง๐ /๐’๐ฎ๐ฉ๐ฉ๐จ๐ซ๐ญ

๐‹๐จ๐œ๐š๐ญ๐ข๐จ๐ง: ๐‚๐ฒ๐›๐ž๐ซ๐ฃ๐š๐ฒ๐š, ๐’๐ž๐ฅ๐š๐ง๐ ๐จ๐ซ, ๐Œ๐š๐ฅ๐š๐ฒ๐ฌ๐ข๐š

๐’๐ก๐ข๐Ÿ๐ญ๐ฌ: 24๐ฑ7 ๐‘๐จ๐ญ๐š๐ญ๐ข๐จ๐ง๐š๐ฅ (๐Ž๐Ÿ๐Ÿ๐ข๐œ๐ž-๐›๐š๐ฌ๐ž๐)

๐„๐ฑ๐ฉ๐ž๐ซ๐ข๐ž๐ง๐œ๐ž: ๐Œ๐ข๐ง๐ข๐ฆ๐ฎ๐ฆ 7 ๐ฒ๐ž๐š๐ซ๐ฌ ๐ข๐ง ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐Ž๐ฉ๐ž๐ซ๐š๐ญ๐ข๐จ๐ง๐ฌ ๐‚๐ž๐ง๐ญ๐ž๐ซ๐ฌ

๐‚๐จ๐ง๐ญ๐š๐œ๐ญ ๐‘๐š๐ฏ๐ข +91 9899624040

๐‘๐จ๐ฅ๐ž ๐Ž๐ฏ๐ž๐ซ๐ฏ๐ข๐ž๐ฐ:

As a Cybersecurity Specialist (SOC Level 3), you will lead the detection, analysis, and mitigation of complex security incidents. You will be responsible for advanced threat hunting, incident response, and guiding junior analysts. Your expertise will drive continuous improvements in SOC processes and security tools to strengthen the organizationโ€™s overall security posture.

Key Responsibilities:

– Serve as the senior escalation point for complex security incidents and provide expert analysis.

– Proactively hunt for threats, vulnerabilities, and incidents within the organization.

– Lead investigations, root cause analysis, and incident remediation efforts.

– Collaborate with IT, risk management, and executive teams to manage and mitigate risks.

– Perform threat analysis and integrate findings into detection mechanisms.

– Develop and maintain SOC playbooks and incident response procedures.

– Mentor junior SOC analysts and contribute to team skill development.

Required Experience & Skills:

– Expertise in Microsoft Security & Compliance solutions (e.g., M365 Defender, Sentinel SIEM).

– Strong background in threat detection, incident response, and security tool management.

– Proficiency in writing and executing queries (KQL, SPL) for security analysis.

– Familiarity with ServiceNow, ITIL processes, and service request management.

– Experience in threat intelligence, malware analysis, and digital forensics.

– Ability to work effectively in a high-pressure, 24×7 security environment.

Qualifications:

– Bachelor’s degree in Cybersecurity or related field.

– Certifications such as GCIH, CISSP, OSCP, or CEH.

Preferred Qualifications:

– Masterโ€™s degree in Cybersecurity.

– Advanced certifications in threat intelligence or digital forensics (e.g., GCFA, GREM).

Performance Criteria:

– Timeliness and effectiveness in incident response.

– Quality of root cause analysis and incident reporting.

– Contribution to SOC process improvements and team mentorship.