Search by job, company or skills

  • Posted 2 days ago
  • Be among the first 10 applicants
Early Applicant

Job Description

Location: India (Noida)

Experience: 610 years overall, 2+ years in SOC leadership

Reports To: Head of Cyber Defense / CISO

Role Summary

Own 247 SOC operations with deep expertise in log analysis and forensics. Lead detection engineering, incident handling, evidence management, and continuous improvement across people, process, and tooling.

Key Responsibilities

  • Direct SOC operations: shift hygiene, SLA tracking, stakeholder comms, executive updates.
  • Detection engineering and content tuning (KQL/ElasticQL/Sigma/SPL) for EDR, identity, email, and cloud.
  • Lead high-severity incidents: scoping, containment, eradication, recovery, PIRs with actionable actions.
  • Forensics & Evidence: acquisition (disk/mem/logs), chain-of-custody, timeline/triage, data integrity (hashing).
  • Purple teaming, tabletop exercises, attack simulations; ATT&CK mapping and coverage metrics.
  • Hiring, mentoring, and career development for analysts; run training and certifications plan.

Required Skills

  • Hands-on with SIEM (Elastic/Splunk/Chronicle) and EDR/XDR (SentinelOne/CrowdStrike), email security, and cloud telemetry.
  • Proficient in log analysis, correlation, and anomaly detection; comfortable with PCAP and memory triage tools.
  • Strong knowledge of IR frameworks (NIST/ISO), evidence handling, and reporting to exec/board audiences.
  • Excellent verbal and written communication under pressure.

Nice-to-Have

  • Experience in regulated environments (fintech/edtech); knowledge of ISO 27001/27701, DPDP, RBI directions.
  • SOAR design/maintenance; malware analysis fundamentals.

KPIs

  • MTTD/MTTR, detection coverage & false-positive rate, PIR action closure, readiness drill scores, stakeholder satisfaction.

More Info

Job Type:
Industry:
Function:
Employment Type:

About Company

Job ID: 135637219

Similar Jobs