Number of Positions: 2
Location: Hyderabad (Work from Office – Mandatory)
Experience: 3–5 Years
Compensation: ₹10 – ₹12 LPA
Summary
24/7 Managed SOC, the L2 Analyst is responsible for real-time threat monitoring, alert analysis, incident triage, and response across hybrid cloud and on-prem environments.
Skills & Responsibilities
- 3–5 years in SOC / Incident Response
- Perform real-time monitoring of security events via SIEM, EDR, and threat intelligence platforms
- Analyze and validate alerts generated from correlation rules, anomaly detection, and behavioral analytics
- Conduct incident triage, investigation, and escalation to L3 teams
- Execute threat response actions (containment, endpoint isolation, blocking malicious activity)
- Perform log analysis across cloud, network, endpoint, and application layers
- Support root cause analysis (RCA) and incident reporting
- Reduce false positives through tuning and correlation improvements
- Ensure adherence to SLA-driven response timelines (MTTD / MTTR reduction)
Required
- Hands-on SIEM (Microsoft Sentinel, QRadar, Splunk)
- EDR/XDR tools (Microsoft Defender, CrowdStrike, etc.)
- Knowledge of MITRE ATT&CK, threat lifecycle, IOC analysis
- Understanding of cloud security monitoring (Azure/AWS/GCP)
- Experience in SOC environments with alert management & log correlation