Search by job, company or skills

C

L2 SOC Security Analyst (SIEM, EDR, Incident Analysis)

Save
new job description bg glownew job description bg glownew job description bg svg
  • Posted 3 hours ago
  • Be among the first 10 applicants
Early Applicant

Job Description

Number of Positions: 2

Location: Hyderabad (Work from Office – Mandatory)

Experience: 3–5 Years

Compensation: ₹10 – ₹12 LPA

Summary

24/7 Managed SOC, the L2 Analyst is responsible for real-time threat monitoring, alert analysis, incident triage, and response across hybrid cloud and on-prem environments.

Skills & Responsibilities

  • 3–5 years in SOC / Incident Response
  • Perform real-time monitoring of security events via SIEM, EDR, and threat intelligence platforms
  • Analyze and validate alerts generated from correlation rules, anomaly detection, and behavioral analytics
  • Conduct incident triage, investigation, and escalation to L3 teams
  • Execute threat response actions (containment, endpoint isolation, blocking malicious activity)
  • Perform log analysis across cloud, network, endpoint, and application layers
  • Support root cause analysis (RCA) and incident reporting
  • Reduce false positives through tuning and correlation improvements
  • Ensure adherence to SLA-driven response timelines (MTTD / MTTR reduction)

Required

  • Hands-on SIEM (Microsoft Sentinel, QRadar, Splunk)
  • EDR/XDR tools (Microsoft Defender, CrowdStrike, etc.)
  • Knowledge of MITRE ATT&CK, threat lifecycle, IOC analysis
  • Understanding of cloud security monitoring (Azure/AWS/GCP)
  • Experience in SOC environments with alert management & log correlation

More Info

Job Type:
Industry:
Function:
Employment Type:

About Company

Job ID: 146981957

Similar Jobs

Early Applicant