Current jobs related to SOC L3 Analyst - Gurugram - DigiVito Solutions LLP
-
Cloud Security
4 days ago
Gurugram, Haryana, India AlmaMate Infotech Private Limited Full time**Job Opening for SOC (**Cloud Security**)** **Soc L2 and Soc L3** **Experience required: 3to10 yrs.** **Location - Gurgaon** **Note: - ** Requirement**:Threat analysis, threat monitoring, threat hunting, threat resolution** **Role Description**: As a Software Engineer - Cloud Security, you will be responsible for designing and implementing security...
-
Trainer - L3
1 week ago
Gurugram, Haryana, India Wipro Limited Full time**Role Definition**: The role of a trainer is to develop a competency and skill sets in an individual to perform his/her effectively and efficiently in the work place. The trainer should communicate to the trainees about what is expected out of training in a simple and professional way. **͏**: **Roles and Responsibilities** The trainer plays a pivotal...
-
SOC Analyst 2
5 days ago
Gurugram, Haryana, India Zensar Technologies Full timeLooking for a workplace where people realize their full potential, are recognized for the impact they make, and enjoy the company of the peers they work with? Welcome to Zensar! Read on for more details on the role and about us. Here's how you'll contribute: In this role you will help us: **- 2+ years of experience in below tools.** Advantages at...
-
Associate, Cybersecurity Mdr
5 days ago
Gurugram, Haryana, India Ankura Full timeAnkura is a team of excellence founded on innovation and growth. - Location: Conditional Remote / Gurgaon - Hours: 40 hours a week - Reporting: Director - Threat Detection Operations (TDO) - Duties include continuous monitoring of Security Information Event Management (SIEM), EDR, XDR, DLP and related platforms for correlated events and alerts and working...
-
Executive - Cyber Transformation
2 weeks ago
Gurugram, Haryana, India KPMG Full timeAbout KPMG in India - KPMG entities in India are professional services firm(s). These Indian member firms are affiliated with KPMG International Limited. KPMG was established in India in August 1993. Our professionals leverage the global network of firms, and are conversant with local laws, regulations, markets and competition. KPMG has offices across India...
-
Cybersecurity Expert
1 week ago
Gurugram, Haryana, India Orange Business Full time**Votre rôle**: - Role & Responsibilities- 8*5 onsite cybersoc support to customer- Plan, implement, configure, and migrate market-leading cyber security solutions (Qradar, Sentinel, Defender etc.)- Ensure that customer environments are always protected against cyber-attacks- Triage and investigate alarms generated by SIEM tools, endpoint protection tools,...
-
Cyber Security Professional
7 days ago
Gurugram, Haryana, India BT Group Full time**Cyber security professional**: - Job Req ID: 44244 - Posting Date: 17 Feb 2025 - Function: Software Engineering - Unit: Digital - Location: 9th & 10th Flr, Gurugram Info, Gurugram, India - Salary: Competitive **Why this job matters**: We build, maintain, develop, and improve centralized security management, monitoring and reporting platforms for BT...
-
Cyfuture - ERPnext Developer
3 weeks ago
Gurgaon/Gurugram/Noida, India CYFUTURE Full timeCompany : Cyfuture India Pvt. Ltd.Location : Gurgaon, IndiaExperience : Minimum 5 YearsPosition: Team Lead - ERPNext DeveloperAbout Cyfuture :Since 2001, Cyfuture has been empowering organizations of all sizes with innovative business solutions, ensuring high-caliber performance and an improved brand image. As an internationally recognized brand known for...
SOC L3 Analyst
1 month ago
Company Description
A Digital Innovation & Transformation CompanyRole Description
This is a full-time on-site role for a SOC L3 Analyst at DigiVito Solutions LLP located in Gurugram. We are seeking a highly experienced SOC L3 Analyst to strengthen our Security Operations Center. The ideal candidate will have advanced expertise in monitoring, analyzing, and mitigating cybersecurity threats, as well as managing security tools and mentoring junior analysts. This role involves proactive threat hunting, incident response, and collaboration with cross-functional teams to enhance the organization’s security posture.
Key Responsibilities
- Extensive experience of supporting and configuring Endpoint detection and response (EDR) tools. Extensive experience of supporting and configuring Security information and event management (SIEM) tools.
- Extensive experience of supporting and configuring Security Orchestration, Automation and Response (SOAR) tools.
- Knowledge about various tools like – SIEM, SSL, Packet Analysis, HIPS/NIPS, Network Monitoring tools, ITHD Ticketing Toolset Web Security, AV, UBEA, Advanced SOC.
- Knowledge of various operating system flavors including but not limited to Windows, Linux, Unix
- Vulnerability Scanning and reporting.
- Prioritizing and tracking remediation of vulnerabilities.
- Creating / modifying firewall configurations and policies.
- Extensive experience of packet-capture tools and analysis of packet flows preferred.
- Extensive experience of security assessment and penetration testing tools preferred.
- Extensive experience of network-based User Behavior Analytics preferred • Extensive Knowledge of Threat Intelligence Services required.
- Ability to provide relevant and timely information to executive leaders based on analysis of events from a SIEM and EDR platforms.
- Be a thought leader in the SOC. Customer-facing, with good report-writing skills and strong communication skills at all levels.
- Ability to consistently deliver to deadlines while prioritizing competing demands for time, without sacrificing quality.
- Professional, hard-working and have the ability to pay attention to detail.
- Good understanding of ITIL processes, including Change Management, Incident Management and Problem Management.
- Concept of SOC, Experience in Cyber Security domain, SIEM (Azure Sentinel).
- Threat intelligence concepts, (Azure Sentinel), Threat modelling & Data modelling.
- Solid understand of enterprise log management and complex log correlation practices as well as alerting system.
- SIEM content development - Use case configuration and logs parsing experience.
- Collaborate with IT, DevOps, and Compliance teams to improve the organization’s overall security posture.
- Able to meet demands for occasional out-of-hours working and on-call escalation.
Qualifications
- B.E degree or equivalent experience in Computing.
- Minimum of 07 years in a SOC environment, with at least 4 years as an L3 Analyst.
- Proficiency in scripting languages such as Python and PowerShell for automation.
- In-depth knowledge of the MITRE ATT&CK Framework and TTPs (Tactics, Techniques, and Procedures).
- Strong analytical and problem-solving skills.
- Excellent communication skills for creating reports and explaining technical issues to non-technical stakeholders.
- Certified Incident Handler (GCIH).
- Certified Information Systems Security Professional (CISSP).