SOC Level 3 Analyst
Panasonic Life Solutions Company
All India, Gurugram • 1 month ago
Experience: 5 to 9 Yrs
PREMIUM
Deal of the Day
--:--:--
A recruiter messaged CVX24 Premium users few seconds ago.
Upgrade to CVX24 Premium: Only $2.49
- Free Resume Writing
-
Get a Verified Blue tick
- See who viewed your profile
- Unlimited chat with recruiters
- Rank higher in recruiter searches
- Get up to 10× more recruiter visibility
- Get practical interview tips and guidance
- Receive verified recruiter messages directly
- Unlock hidden jobs, not visible to free users
$4.99
$2.49
🔥 50% OFF
Activate
$4.99
$2.49
all inc.
(Validity: 6 Months. After payment confirmation we will reach out to you)
Enter Your Details
Job Description
As a Senior SOC analyst, your role involves advanced investigations, cross-tool correlation, root cause analysis, and complex containment/eradication within a Microsoft-centric environment. Your strong, recent, hands-on experience with tools like Microsoft Sentinel, Defender XDR, and Entra ID in production environments is mandatory. You will be working in both IT and OT environments. While OT related experience is a plus, it is not required; however, willingness to learn is essential.
Your key outcomes and KPIs include reducing Mean Time to Acknowledge (MTTA) and Mean Time to Resolve (MTTR) through tuned analytics and automation, increasing detection fidelity, suppressing false positives, and maintaining audit-ready documentation and consistent ServiceNow records.
Your core responsibilities will involve owning alert management and incident response, proactively monitoring security events, driving advanced investigations, leading containment and eradication efforts, authoring complex KQL queries, tuning analytic rules, maintaining automation, overseeing ServiceNow lifecycles for complex cases, mentoring L1 analysts, leading User and Entity Behavior Analytics (UEBA) assessments, and contributing to tuning SOC processes.
In terms of qualification requirements, you should have at least 5 years of experience in IT Security operations and/or planning. Your technical expertise should cover networks, Windows/Linux operations, infrastructure, cloud concepts, and Microsoft Security & Identity tools like Microsoft Sentinel, Defender XDR, and Entra ID. Additionally, you should have experience with complementary platforms like Zscaler, Trend Micro, and ServiceNow ITSM, as well as knowledge of threat intelligence and frameworks such as MITRE ATT&CK.
Soft skills required for this role include fluent business English, effective communication, collaboration abilities, autonomy in work, self-directed learning capacity, advanced Excel knowledge, presentation skills, basic knowledge of ITIL and NIST CSF Frameworks, experience in project management, and familiarity with Power BI.
Your hands-on experience with the Microsoft security stack and integrated tooling is crucial for this role. While relevant education or industry certifications are beneficial, competency and proven results are given priority. As a Senior SOC analyst, your role involves advanced investigations, cross-tool correlation, root cause analysis, and complex containment/eradication within a Microsoft-centric environment. Your strong, recent, hands-on experience with tools like Microsoft Sentinel, Defender XDR, and Entra ID in production environments is mandatory. You will be working in both IT and OT environments. While OT related experience is a plus, it is not required; however, willingness to learn is essential.
Your key outcomes and KPIs include reducing Mean Time to Acknowledge (MTTA) and Mean Time to Resolve (MTTR) through tuned analytics and automation, increasing detection fidelity, suppressing false positives, and maintaining audit-ready documentation and consistent ServiceNow records.
Your core responsibilities will involve owning alert management and incident response, proactively monitoring security events, driving advanced investigations, leading containment and eradication efforts, authoring complex KQL queries, tuning analytic rules, maintaining automation, overseeing ServiceNow lifecycles for complex cases, mentoring L1 analysts, leading User and Entity Behavior Analytics (UEBA) assessments, and contributing to tuning SOC processes.
In terms of qualification requirements, you should have at least 5 years of experience in IT Security operations and/or planning. Your technical expertise should cover networks, Windows/Linux operations, infrastructure, cloud concepts, and Microsoft Security & Identity tools like Microsoft Sentinel, Defender XDR, and Entra ID. Additionally, you should have experience with complementary platforms like Zscaler, Trend Micro, and ServiceNow ITSM, as well as knowledge of threat intelligence and frameworks such as MITRE ATT&CK.
Soft skills required for this role include fluent business English, effective communication, collaboration abilities, autonomy in work, self-directed learning capacity, advanced Excel knowledge, presentation skills, basic knowledge of ITIL and NIST CSF Frameworks, experience in project management, and familiarity with Power BI.
Your hands-on experience with the Microsoft security stack and integrated tooling is crucial for this role. While relevant education or industry certifications are beneficial, competency and proven results are given priority.
Skills Required
Posted on: March 3, 2026
Relevant Jobs
Step 2 of 2