InfoSec L2 SOC Analyst
Zoetis Inc.
All India, Hyderabad • 2 months ago
Experience: 4 to 8 Yrs
PREMIUM
Deal of the Day
--:--:--
A recruiter messaged CVX24 Premium users few seconds ago.
Upgrade to CVX24 Premium: Only $2.49
- Free Resume Writing
-
Get a Verified Blue tick
- See who viewed your profile
- Unlimited chat with recruiters
- Rank higher in recruiter searches
- Get up to 10× more recruiter visibility
- Get practical interview tips and guidance
- Receive verified recruiter messages directly
- Unlock hidden jobs, not visible to free users
$4.99
$2.49
🔥 50% OFF
Activate
$4.99
$2.49
all inc.
(Validity: 6 Months. After payment confirmation we will reach out to you)
Enter Your Details
Job Description
As a Senior SOC Analyst at Zoetis India Capability Center (ZICC) in Hyderabad, you will be an integral part of the Information Security Strategy & Risk Management team. Your role involves collaborating closely with onshore security teams to investigate, triage, and respond to alerts across Zoetis. You will play a key role in ensuring the reliability, accuracy, and effectiveness of information security operations, focusing on continuous improvement of detection and response capabilities.
**Role Overview:**
You will partner with onshore SOC and incident response teams to investigate, triage, and respond to endpoint-related alerts. Analyzing and interpreting SIEM detections, supporting continuous tuning of detections, identifying gaps in endpoint visibility, and performing deep-dive investigations on suspicious endpoint activity will be part of your responsibilities. Additionally, you will collaborate with various teams to align on threat detection strategies and maintain incident response playbooks.
**Key Responsibilities:**
- Investigate, triage, and respond to endpoint-related alerts using CrowdStrike EDR/SIEM
- Analyze and interpret SIEM detections to determine severity and scope, and take appropriate containment actions
- Support continuous tuning of detections by providing feedback on false positives and missed detections
- Identify gaps in endpoint visibility and contribute to improving sensor coverage and telemetry quality
- Perform deep-dive investigations on suspicious endpoint activity using threat intelligence and historical telemetry
- Collaborate with different teams to align on threat detection strategies and maintain incident response playbooks
- Act as a technical escalation point for junior analysts and monitor the effectiveness of SIEM/EDR detections
**Qualifications Required:**
- University Degree in Computer Science or Information Systems
- Relevant certifications such as CISSP, SANS GCIH, or OSCP are desirable
- 4+ years of experience in security operations, CrowdStrike EDR, threat intelligence, and security engineering
- Experience in the pharmaceutical or regulated industry, especially Animal Health
- Strong working knowledge of security technologies, scripting, cloud platforms, network security principles, IAM solutions, incident response processes, and regulatory frameworks
- Excellent verbal and written communication skills
Join Zoetis in pioneering innovation and driving the future of animal healthcare by leveraging your technical skills and expertise to strengthen the organization's ability to detect, analyze, and respond to cyber threats. Flexibility in participating in a rotating shift schedule is required to provide support for 24x7 operations.
If you are passionate about cybersecurity and want to make a real impact in a dynamic digital environment, apply now to be a part of Zoetis' mission to ensure sustainable growth and maintain a competitive edge globally. As a Senior SOC Analyst at Zoetis India Capability Center (ZICC) in Hyderabad, you will be an integral part of the Information Security Strategy & Risk Management team. Your role involves collaborating closely with onshore security teams to investigate, triage, and respond to alerts across Zoetis. You will play a key role in ensuring the reliability, accuracy, and effectiveness of information security operations, focusing on continuous improvement of detection and response capabilities.
**Role Overview:**
You will partner with onshore SOC and incident response teams to investigate, triage, and respond to endpoint-related alerts. Analyzing and interpreting SIEM detections, supporting continuous tuning of detections, identifying gaps in endpoint visibility, and performing deep-dive investigations on suspicious endpoint activity will be part of your responsibilities. Additionally, you will collaborate with various teams to align on threat detection strategies and maintain incident response playbooks.
**Key Responsibilities:**
- Investigate, triage, and respond to endpoint-related alerts using CrowdStrike EDR/SIEM
- Analyze and interpret SIEM detections to determine severity and scope, and take appropriate containment actions
- Support continuous tuning of detections by providing feedback on false positives and missed detections
- Identify gaps in endpoint visibility and contribute to improving sensor coverage and telemetry quality
- Perform deep-dive investigations on suspicious endpoint activity using threat intelligence and historical telemetry
- Collaborate with different teams to align on threat detection strategies and maintain incident response playbooks
- Act as a technical escalation point for junior analysts and monitor the effectiveness of SIEM/EDR detections
**Qualifications Required:**
- University Degree in Computer Science or Information Systems
- Relevant certifications such as CISSP, SANS GCIH, or OSCP are desirable
- 4+ years of experience in security operations, CrowdStrike EDR, threat intelligence,
Skills Required
Security Operations
Threat Intelligence
Security Engineering
Python
PowerShell
Bash scripting
Azure
GCP
Network Security
Vulnerability Management
Regulatory Compliance
CrowdStrike EDR
SIEM platforms
Cloud Platforms AWS
Identity
Access Management IAM
Incident Response
Cryptographic Concepts
Verbal
Written Communication
Posted on: February 24, 2026
Relevant Jobs
Step 2 of 2