Current jobs related to SOC L3 Analyst - Gurugram - DigiVito Solutions LLP

  • Cloud Security

    4 days ago


    Gurugram, Haryana, India AlmaMate Infotech Private Limited Full time

    **Job Opening for SOC (**Cloud Security**)** **Soc L2 and Soc L3** **Experience required: 3to10 yrs.** **Location - Gurgaon** **Note: - ** Requirement**:Threat analysis, threat monitoring, threat hunting, threat resolution** **Role Description**: As a Software Engineer - Cloud Security, you will be responsible for designing and implementing security...

  • Trainer - L3

    1 week ago


    Gurugram, Haryana, India Wipro Limited Full time

    **Role Definition**: The role of a trainer is to develop a competency and skill sets in an individual to perform his/her effectively and efficiently in the work place. The trainer should communicate to the trainees about what is expected out of training in a simple and professional way. **͏**: **Roles and Responsibilities** The trainer plays a pivotal...

  • SOC Analyst 2

    5 days ago


    Gurugram, Haryana, India Zensar Technologies Full time

    Looking for a workplace where people realize their full potential, are recognized for the impact they make, and enjoy the company of the peers they work with? Welcome to Zensar! Read on for more details on the role and about us. Here's how you'll contribute: In this role you will help us: **- 2+ years of experience in below tools.** Advantages at...


  • Gurugram, Haryana, India Ankura Full time

    Ankura is a team of excellence founded on innovation and growth. - Location: Conditional Remote / Gurgaon - Hours: 40 hours a week - Reporting: Director - Threat Detection Operations (TDO) - Duties include continuous monitoring of Security Information Event Management (SIEM), EDR, XDR, DLP and related platforms for correlated events and alerts and working...


  • Gurugram, Haryana, India KPMG Full time

    About KPMG in India - KPMG entities in India are professional services firm(s). These Indian member firms are affiliated with KPMG International Limited. KPMG was established in India in August 1993. Our professionals leverage the global network of firms, and are conversant with local laws, regulations, markets and competition. KPMG has offices across India...


  • Gurugram, Haryana, India Orange Business Full time

    **Votre rôle**: - Role & Responsibilities- 8*5 onsite cybersoc support to customer- Plan, implement, configure, and migrate market-leading cyber security solutions (Qradar, Sentinel, Defender etc.)- Ensure that customer environments are always protected against cyber-attacks- Triage and investigate alarms generated by SIEM tools, endpoint protection tools,...


  • Gurugram, Haryana, India BT Group Full time

    **Cyber security professional**: - Job Req ID: 44244 - Posting Date: 17 Feb 2025 - Function: Software Engineering - Unit: Digital - Location: 9th & 10th Flr, Gurugram Info, Gurugram, India - Salary: Competitive **Why this job matters**: We build, maintain, develop, and improve centralized security management, monitoring and reporting platforms for BT...


  • Gurgaon/Gurugram/Noida, India CYFUTURE Full time

    Company : Cyfuture India Pvt. Ltd.Location : Gurgaon, IndiaExperience : Minimum 5 YearsPosition: Team Lead - ERPNext DeveloperAbout Cyfuture :Since 2001, Cyfuture has been empowering organizations of all sizes with innovative business solutions, ensuring high-caliber performance and an improved brand image. As an internationally recognized brand known for...

SOC L3 Analyst

1 month ago


Gurugram, India DigiVito Solutions LLP Full time

Company Description

A Digital Innovation & Transformation Company



Role Description

This is a full-time on-site role for a SOC L3 Analyst at DigiVito Solutions LLP located in Gurugram. We are seeking a highly experienced SOC L3 Analyst to strengthen our Security Operations Center. The ideal candidate will have advanced expertise in monitoring, analyzing, and mitigating cybersecurity threats, as well as managing security tools and mentoring junior analysts. This role involves proactive threat hunting, incident response, and collaboration with cross-functional teams to enhance the organization’s security posture.


Key Responsibilities


  • Extensive experience of supporting and configuring Endpoint detection and response (EDR) tools. Extensive experience of supporting and configuring Security information and event management (SIEM) tools.
  • Extensive experience of supporting and configuring Security Orchestration, Automation and Response (SOAR) tools.
  • Knowledge about various tools like – SIEM, SSL, Packet Analysis, HIPS/NIPS, Network Monitoring tools, ITHD Ticketing Toolset Web Security, AV, UBEA, Advanced SOC.
  • Knowledge of various operating system flavors including but not limited to Windows, Linux, Unix
  • Vulnerability Scanning and reporting.
  • Prioritizing and tracking remediation of vulnerabilities.
  • Creating / modifying firewall configurations and policies.
  • Extensive experience of packet-capture tools and analysis of packet flows preferred.
  • Extensive experience of security assessment and penetration testing tools preferred.
  • Extensive experience of network-based User Behavior Analytics preferred • Extensive Knowledge of Threat Intelligence Services required.
  • Ability to provide relevant and timely information to executive leaders based on analysis of events from a SIEM and EDR platforms.
  • Be a thought leader in the SOC. Customer-facing, with good report-writing skills and strong communication skills at all levels.
  • Ability to consistently deliver to deadlines while prioritizing competing demands for time, without sacrificing quality.
  • Professional, hard-working and have the ability to pay attention to detail.
  • Good understanding of ITIL processes, including Change Management, Incident Management and Problem Management.
  • Concept of SOC, Experience in Cyber Security domain, SIEM (Azure Sentinel).
  • Threat intelligence concepts, (Azure Sentinel), Threat modelling & Data modelling.
  • Solid understand of enterprise log management and complex log correlation practices as well as alerting system.
  • SIEM content development - Use case configuration and logs parsing experience.
  • Collaborate with IT, DevOps, and Compliance teams to improve the organization’s overall security posture.
  • Able to meet demands for occasional out-of-hours working and on-call escalation.


Qualifications

  • B.E degree or equivalent experience in Computing.
  • Minimum of 07 years in a SOC environment, with at least 4 years as an L3 Analyst.
  • Proficiency in scripting languages such as Python and PowerShell for automation.
  • In-depth knowledge of the MITRE ATT&CK Framework and TTPs (Tactics, Techniques, and Procedures).
  • Strong analytical and problem-solving skills.
  • Excellent communication skills for creating reports and explaining technical issues to non-technical stakeholders.
  • Certified Incident Handler (GCIH).
  • Certified Information Systems Security Professional (CISSP).