L2 SOC Analyst
UST
Hyderabad • 2 months ago
Experience: 3 to 7 Yrs
PREMIUM
Deal of the Day
--:--:--
15 Days Free Trial
After Free Trial → Flat 50% OFF
Upgrade to CVX24 Premium
- Free Resume Writing
-
Get a Verified Blue tick
- See who viewed your profile
- Unlimited chat with recruiters
- Rank higher in recruiter searches
- Get up to 10× more recruiter visibility
- Auto-forward profile to 10 top recruiters
- Receive verified recruiter messages directly
- Unlock hidden jobs, not visible to free users
$0
Activate
$0
A small token amount will be charged to verify.
Get Refund in 48 Hours.
Free Earplugs Delivery Only after Payment of Rs. 99 for Five Consecutive Months.
After free-trial 6 Months subscription will be auto Activated @ $
1
(Cancel Anytime). Quoted price includes 50% discount.
Enter Your Details
Job Description
Role Overview:
You will be responsible for monitoring cyber security incidents for global customers in a 24x7x365 operations team under minimal supervision of the Team Lead. Your role will involve mentoring junior team members, responding to low and medium complexity incidents independently, assisting the Team Lead in supervisory activities, and ensuring that cyber security incidents from the SIEM and multiple sources are dealt with by the entire team within SLA. Additionally, you will be involved in training and motivating the team to follow documented playbook, ensuring quality of service across the team, and reviewing and recommending topics for inclusion or upgrade in the playbook.
Key Responsibilities:
- Mentor junior members of the team to help them learn and achieve their full potential
- Respond independently to low and medium complexity incidents
- Assist the Team Lead in supervisory activities leading to a high-performance organization
- Ensure cyber security incidents are dealt with by the entire team within SLA
- Train and motivate the team to follow documented playbook
- Review and recommend topics for inclusion or upgrade in the playbook
- Adherence to defined SOC processes including housekeeping tasks and Information Security policies
Qualifications Required:
- 3 to 5 years of experience in SOC operations with a global organization
- University Degree in Cyber Security (no back papers) / Bachelors in Science or Engineering with training in cyber security
- Highly proficient in Cybersecurity Incident Management process
- Highly proficient and up to date in cyber security incidents
- Intermediate understanding of enterprise IT infrastructure including Networks, Firewalls, OS, Databases, Web Applications, etc.
- Understanding of ISMS principles and guidelines, relevant frameworks (e.g. ISO27001)
- Desirable Training / Certification in Ethical Hacking Tools, Process and Frameworks related to cyber security, etc.
Additional Company Details (if available):
- Collaborate with teams to optimize detections and playbooks
- Analyze and triage security incidents
- Mentor and train junior analysts
- Serve as escalation point for Junior analysts
- Participate in incident response activities as necessary
- Strong grasp of operating systems (Windows, Linux, MacOS) and networking protocols and concepts
- Extensive knowledge of internet security issues and the threat landscape
- Previous experience with tools like Splunk, EDR Solutions, Microsoft Security products
- Problem-solver with excellent communication skills, deep technical understanding of security best practices
- Knowledge with threat hunting
- Strong grasp of the Incident response life cycle
- Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources
- Capable of writing advanced ad-hoc SPL queries
- Analyze log files from various sources to identify possible threats to network security
- Utilize SIEM tools such as SPLUNK and EDR tools to enhance monitoring capabilities
- 4+ years of experience in a SOC or Fusion Center environment
- Incident Response specific or other relevant certifications (e.g., GCIH, ECIH, SEC +)
- Experience with incident response in cloud platforms (AWS, GCP, etc) Role Overview:
You will be responsible for monitoring cyber security incidents for global customers in a 24x7x365 operations team under minimal supervision of the Team Lead. Your role will involve mentoring junior team members, responding to low and medium complexity incidents independently, assisting the Team Lead in supervisory activities, and ensuring that cyber security incidents from the SIEM and multiple sources are dealt with by the entire team within SLA. Additionally, you will be involved in training and motivating the team to follow documented playbook, ensuring quality of service across the team, and reviewing and recommending topics for inclusion or upgrade in the playbook.
Key Responsibilities:
- Mentor junior members of the team to help them learn and achieve their full potential
- Respond independently to low and medium complexity incidents
- Assist the Team Lead in supervisory activities leading to a high-performance organization
- Ensure cyber security incidents are dealt with by the entire team within SLA
- Train and motivate the team to follow documented playbook
- Review and recommend topics for inclusion or upgrade in the playbook
- Adherence to defined SOC processes including housekeeping tasks and Information Security policies
Qualifications Required:
- 3 to 5 years of experience in SOC operations with a global organization
- University Degree in Cyber Security (no back papers) / Bachelors in Science or Engineering with training in cyber security
- Highly proficient in Cybersecurity Incident Management process
- Highly proficient and up to date in cyber security incidents
- Intermediate understanding of enterprise IT infrastructure including Networks, Firewalls, OS, Databases,
Skills Required
Posted on: March 7, 2026
Relevant Jobs
Step 2 of 2