Job Description
๐๐๐๐ฆ: ๐๐จ๐ง๐ข๐ญ๐จ๐ซ๐ข๐ง๐ /๐๐ฎ๐ฉ๐ฉ๐จ๐ซ๐ญ
๐๐จ๐๐๐ญ๐ข๐จ๐ง: ๐๐ฒ๐๐๐ซ๐ฃ๐๐ฒ๐, ๐๐๐ฅ๐๐ง๐ ๐จ๐ซ, ๐๐๐ฅ๐๐ฒ๐ฌ๐ข๐
๐๐ก๐ข๐๐ญ๐ฌ: 24๐ฑ7 ๐๐จ๐ญ๐๐ญ๐ข๐จ๐ง๐๐ฅ (๐๐๐๐ข๐๐-๐๐๐ฌ๐๐)
๐๐ฑ๐ฉ๐๐ซ๐ข๐๐ง๐๐: ๐๐ข๐ง๐ข๐ฆ๐ฎ๐ฆ 7 ๐ฒ๐๐๐ซ๐ฌ ๐ข๐ง ๐๐๐๐ฎ๐ซ๐ข๐ญ๐ฒ ๐๐ฉ๐๐ซ๐๐ญ๐ข๐จ๐ง๐ฌ ๐๐๐ง๐ญ๐๐ซ๐ฌ
๐๐จ๐ง๐ญ๐๐๐ญ ๐๐๐ฏ๐ข +91 9899624040
๐๐จ๐ฅ๐ ๐๐ฏ๐๐ซ๐ฏ๐ข๐๐ฐ:
As a Cybersecurity Specialist (SOC Level 3), you will lead the detection, analysis, and mitigation of complex security incidents. You will be responsible for advanced threat hunting, incident response, and guiding junior analysts. Your expertise will drive continuous improvements in SOC processes and security tools to strengthen the organizationโs overall security posture.
Key Responsibilities:
– Serve as the senior escalation point for complex security incidents and provide expert analysis.
– Proactively hunt for threats, vulnerabilities, and incidents within the organization.
– Lead investigations, root cause analysis, and incident remediation efforts.
– Collaborate with IT, risk management, and executive teams to manage and mitigate risks.
– Perform threat analysis and integrate findings into detection mechanisms.
– Develop and maintain SOC playbooks and incident response procedures.
– Mentor junior SOC analysts and contribute to team skill development.
Required Experience & Skills:
– Expertise in Microsoft Security & Compliance solutions (e.g., M365 Defender, Sentinel SIEM).
– Strong background in threat detection, incident response, and security tool management.
– Proficiency in writing and executing queries (KQL, SPL) for security analysis.
– Familiarity with ServiceNow, ITIL processes, and service request management.
– Experience in threat intelligence, malware analysis, and digital forensics.
– Ability to work effectively in a high-pressure, 24×7 security environment.
Qualifications:
– Bachelor’s degree in Cybersecurity or related field.
– Certifications such as GCIH, CISSP, OSCP, or CEH.
Preferred Qualifications:
– Masterโs degree in Cybersecurity.
– Advanced certifications in threat intelligence or digital forensics (e.g., GCFA, GREM).
Performance Criteria:
– Timeliness and effectiveness in incident response.
– Quality of root cause analysis and incident reporting.
– Contribution to SOC process improvements and team mentorship.