Deputy Manager - IT Security Operations
CorroHealth
All India, Chennai • 1 month ago
Experience: 5 to 10 Yrs
PREMIUM
Deal of the Day
--:--:--
A recruiter messaged CVX24 Premium users few seconds ago.
Upgrade to CVX24 Premium: Only $2.49
- Free Resume Writing
-
Get a Verified Blue tick
- See who viewed your profile
- Unlimited chat with recruiters
- Rank higher in recruiter searches
- Get up to 10× more recruiter visibility
- Get practical interview tips and guidance
- Receive verified recruiter messages directly
- Unlock hidden jobs, not visible to free users
$4.99
$2.49
🔥 50% OFF
Activate
$4.99
$2.49
all inc.
(Validity: 6 Months. After payment confirmation we will reach out to you)
Enter Your Details
Job Description
As a Security Engineer/Analyst at CorroHealth, your primary responsibility will be to manage IT operations with a focus on high availability, scalability, and security. Your key responsibilities will include:
- Managing IT operations with a strong emphasis on IT Infra and L3 level expertise in Security Ops.
- Overseeing incident response efforts using tools like SIEM and CrowdStrike to quickly identify and mitigate threats.
- Collaborating with cross-functional teams to implement L3 support processes for critical applications.
- Developing and maintaining documentation for IT procedures, policies, and standards.
- Ensuring compliance with industry standards and best practices.
- Providing technical guidance and support to junior team members.
In order to be successful in this role, you should have:
- 10 years of total experience with 7-8 years of specialized expertise in Cybersecurity.
- Minimum 5 years of hands-on experience in a Security Operations Center (SOC) environment.
At the core responsibilities level (L3), you will be expected to:
- Lead complex security incident investigations and provide expert-level forensics and technical analysis.
- Perform end-to-end incident management, including containment, eradication, recovery, and root-cause analysis.
- Act as a senior escalation point for L1/L2 analysts and guide them through complex investigations.
- Conduct proactive threat hunting to identify advanced threats and analyze security logs to detect attack patterns.
- Investigate zero-day vulnerabilities, newly reported CVEs, and emerging cyber threats.
- Enhance SOC operations through the development and maintenance of detection use cases, correlation rules, and event logic.
- Drive continuous improvements across SOC processes, SLAs, shift workflows, and operational maturity.
You will also be involved in:
- Leading technical implementations and onboarding of new security tools and integrations.
- Overseeing enhancements in SIEM architecture and deployment of various security technologies.
- Demonstrating strong technical expertise in cyberattacks, threat vectors, incident response frameworks, and network security architecture.
- Collaborating with cross-functional teams and providing technical recommendations for remediation and risk reduction.
- Monitoring, assessing, and responding to high severity alerts in a 24/7 SOC environment.
Your expertise across various security tools, platforms, and technologies will be crucial for success in this role. Additionally, your leadership and collaboration skills will be essential in mentoring and guiding junior team members and collaborating with different teams within the organization.
Please note the job classification and contact details mentioned below:
Industry: BPM / BPO
Functional Area / Department: IT & Information Security
Role Category: IT Security
Role: Security Engineer / Analyst
Employment Type: Full time
Company: CorroHealth
Location(s): Chennai As a Security Engineer/Analyst at CorroHealth, your primary responsibility will be to manage IT operations with a focus on high availability, scalability, and security. Your key responsibilities will include:
- Managing IT operations with a strong emphasis on IT Infra and L3 level expertise in Security Ops.
- Overseeing incident response efforts using tools like SIEM and CrowdStrike to quickly identify and mitigate threats.
- Collaborating with cross-functional teams to implement L3 support processes for critical applications.
- Developing and maintaining documentation for IT procedures, policies, and standards.
- Ensuring compliance with industry standards and best practices.
- Providing technical guidance and support to junior team members.
In order to be successful in this role, you should have:
- 10 years of total experience with 7-8 years of specialized expertise in Cybersecurity.
- Minimum 5 years of hands-on experience in a Security Operations Center (SOC) environment.
At the core responsibilities level (L3), you will be expected to:
- Lead complex security incident investigations and provide expert-level forensics and technical analysis.
- Perform end-to-end incident management, including containment, eradication, recovery, and root-cause analysis.
- Act as a senior escalation point for L1/L2 analysts and guide them through complex investigations.
- Conduct proactive threat hunting to identify advanced threats and analyze security logs to detect attack patterns.
- Investigate zero-day vulnerabilities, newly reported CVEs, and emerging cyber threats.
- Enhance SOC operations through the development and maintenance of detection use cases, correlation rules, and event logic.
- Drive continuous improvements across SOC processes, SLAs, shift workflows, and operational maturity.
You will also be involved in:
- Leading technical implementations and onboarding of new security tools and integrations.
- Overseeing enhancements in SIEM architecture and deployment of various security technologies.
- De
Skills Required
IT operations
SIEM
Vulnerability Management
VAPT
IDSIPS
JIRA
ServiceNow
Leadership
Collaboration
IT Infra
Security Ops
CrowdStrike
L3 support
Cybersecurity
Security Operations Center SOC
Forensics
Threat hunting
SIEM Splunk
CrowdStrike
UEBA
EDR
SSL inspection
Packet analysis
CrowdStrike Falcon
SOAR platforms
Posted on: March 28, 2026
Relevant Jobs
Step 2 of 2