Career / Sr. SOC Analyst

Sr. SOC Analyst

Security & Resilience | Senior Level | Full Time | Kochi / Bengaluru

Job Description

Introduction

We are looking for a Senior SOC Analyst to join our Cyber Security team. You will lead threat detection, incident response, and proactive threat hunting across enterprise environments, while mentoring junior analysts and developing advanced detection use cases.

Key Responsibilities

  • Thoroughly document incident response analysis activities.
  • Detect incidents through proactive threat hunting across security-relevant datasets.
  • Review investigations conducted by junior analysts to ensure quality standards are met.
  • Develop new, repeatable methods for finding malicious activity across networks.
  • Provide recommendations to enhance detection and protection capabilities.
  • Develop and follow detailed operational processes to analyse, escalate, and assist in remediation of security incidents.
  • Prioritise multiple high-priority tasks and formulate responses in a fast-paced environment.
  • Advanced proactive threat hunting and adversary emulation.
  • Advanced use case design for insider threat, operational, threat detection and response.
  • Review defensive and detective controls to reduce client attack surface.
  • Engage with and mentor junior team members.
  • Work with other teams on major engineering and architecture initiatives.
  • Be innovative in understanding attack methodologies, malware analysis, and malicious toolkits.
  • Regularly present technical topics to technical and non-technical audiences.
Requirements & Qualifications

Key Responsibilities

  • 5+ years operational experience assessing, reviewing, and remediating infrastructure vulnerabilities, CVEs, and risks.
  • Knowledge of cyber security threats, vendor computing environments, and network and server security.
  • Experience with CVEs, CVSS scores, compensating controls, and mitigating factors.
  • Knowledge of Information Security frameworks, guidelines, and standard methodologies.
  • Proficiency with Windows and/or Linux operating systems.
  • Knowledge of cybersecurity controls, logging, and monitoring tools.
  • Moderate to complex investigations using endpoint, UEBA, public cloud, SaaS, and packet analysis tools.
  • Extensive experience with the MITRE ATT&CK framework and associated tactics.
  • Extensive alert triage and endpoint investigations using EDR technologies.
  • EDR experience with CrowdStrike, Carbon Black, Microsoft Defender, or Endgame.
  • Experience building use cases (content creation) with SIEM tools.
  • Phishing analysis and malware analysis (excluding reverse engineering).
  • Proactive threat hunting using multiple client tools.
  • Strong knowledge of network security including Firewalls (Palo Alto preferred), IDS, TCP/IP, and network analysis.
  • Strong attention to detail and experience developing IR playbooks and reporting using Power BI or similar.
  • Application of threat intelligence to improve detection and response capabilities.
  • Excellent verbal and written communication skills.
  • Experience coordinating with multiple teams for rapid incident response and resolution.
Nice to Have

Key Responsibilities

  • Experience in system administration of Active Directory, Microsoft Azure, Windows Servers, and Unix environments.
  • Scripting knowledge (PowerShell, Java, Perl).
  • Knowledge of databases and query languages such as SQL.