SOC Analyst L3

4 days ago


New Delhi, India Sanganan IT Solutions Pvt Ltd. Full time

Job Title: Level 3 Security Operations Center (SOC) AnalystJob Type: Full TimeJob Location:- WORK FROM NOIDA OFFICE, PLEASE DON'T APPLY IF YOU ARE LOOKING FOR HYBRID OR WORK FROM HOME - Short notice period or immediate joiners are preferred.SOC Analyst L3Job Title: Level 3 Security Operations Center (SOC) AnalystJob Type: Full-Time / ContractJob Overview:As a Level 3 SOC Analyst, you will lead advanced threat hunting, detection engineering, and incident response planning activities within a 24/7 MSSP environment. You’ll act as a strategic escalation point for complex incidents and bridge threat intelligence, engineering, and client-facing security functions. You will also be responsible for delivering high-impact deliverables, such as Threat Intelligence Digests, Alert Tuning Reports, and Customer-Facing Security Presentations—all aligned to operational SLAs and governance frameworks.This role requires strong leadership, technical expertise in modern SIEM and EDR platforms (especially Microsoft Sentinel), and experience in executing MSSP service delivery obligations, including IR tabletop exercises, SLA/KPI dashboards, and quarterly threat reviews.Key Responsibilities:1. Advanced Threat Hunting & Detection Engineering- Lead targeted threat hunting activities based on hypotheses and threat intelligence using KQL, MITRE ATT&CK, and behavioral analytics. - Design and develop advanced detection content (Sigma rules, UEBA baselines, custom rules) across SIEM and EDR platforms. - Identify and close detection gaps through continuous telemetry analysis and logic refinement. - Coordinate log source visibility reviews, baselining, and high-fidelity use case design.2. Threat Intelligence & Operational Reporting- Produce and distribute Weekly Threat Intelligence Digests summarizing current threats, attack trends, and IOCs relevant to customer environments. - Map observed activities to TTPs and threat actor profiles. - Maintain threat dashboards and feed integrations to support proactive defense.3. Alert Tuning & Detection Optimization- Lead biweekly Alert Tuning efforts to analyze false positives, adjust thresholds, and suppress noisy detections. - Deliver a formal Biweekly Alert Tuning Report outlining tuning actions, impact assessments, and next steps. - Collaborate with content authors to implement rule changes and push updates to production environments via controlled change processes.4. Incident Response Leadership & Crisis Escalation- Serve as the final escalation point for Priority 1 (P1) or crisis-level incidents, ensuring incident bridge calls, executive reporting, and customer coordination occur within SLA timelines. - Perform deep-dive investigations into root causes and adversary techniques. - Own incident post-mortems and RCA (Root Cause Analysis) documentation. - Ensure compliance with the IR lifecycle from detection to closure, with audit-ready documentation.5. MSSP Reporting & Executive Briefings- Prepare and deliver Monthly and Quarterly Security Reports to MSSP clients covering: - Alert trends, threat landscape updates, SLA/KPI dashboards - Executive summaries, incident breakdowns, and risk remediation insights - Present findings to customer stakeholders via scheduled service review meetings and executive briefings. - Ensure SLA compliance targets are tracked and reported, including MTTD, MTTR, escalation compliance, and false positive rates.6. IR Tabletop Exercise Management- Plan, facilitate, and report on Quarterly Incident Response Tabletop Exercises with internal and external stakeholders. - Develop realistic, role-based tabletop scenarios (ransomware, insider threat, data exfiltration, etc.). - Deliver Tabletop Exercise Reports with participant feedback, lessons learned, and actionable improvements.7. SOC Governance & Pre-Onboarding Support- Contribute to MSSP onboarding by helping define: - Log source mapping and ingestion validation - Detection rule baselines, alert taxonomy, and escalation matrix - Secure communication procedures and SLA/OLA handoff alignment - Support pre-engagement risk assessments and operational readiness reviews.Required Skills & Qualifications:1.Education:·Bachelor’s Degree in Cybersecurity, Computer Science, Information Systems, or related field.·Master’s Degree is a plus.2.Certifications (Preferred):·Microsoft Certified: Security Operations Analyst Associate·GIAC (GCIA, GCIH, GCFA, GNFA)·CompTIA CySA+, CASP+, or equivalent·MITRE ATT&CK Defender (MAD) certification is advantageous3.Technical Skills:·Expert in SIEM technologies (Microsoft Sentinel preferred), KQL, log analysis, and data correlation.·Hands-on experience with EDR tools (Defender for Endpoint, CrowdStrike, etc.).·Strong knowledge of MITRE ATT&CK, NIST IR lifecycle, and threat modeling.·Familiarity with threat intel platforms (MISP, Anomaly, Recorded Future).·Understanding of cloud security (Azure, M365, hybrid environments).4.Soft Skills:·Strong presentation and documentation skills, especially for executive and customer audiences.·Proven ability to lead and manage cross-functional engagements (internal & external).·Analytical mindset with an investigative approach to threat detection.·Ability to work independently in high-pressure and time-sensitive environments.·Proven English communication skills supported by professional certifications such as IELTS, TOEIC, or BEC.·Ability to write technical and executive-level documentation in English, including reports, presentations, and incident summaries.Experience:·8-10+ years of experience in cybersecurity operations, with at least 2 years in a Level 2 or Level 3 SOC role.·Experience in delivering threat hunts, writing detection content, and handling major security incidents.·Prior MSSP experience or customer-facing security role is a significant advantage.


  • SOC Engineer

    1 week ago


    New Delhi, India ITC Infotech Full time

    SOC Engineer - L3Location: HyderabadMode: HybridRole Summary- Act as the senior-level analyst responsible for handling complex security incidents and advanced threats. - Lead investigations, triage escalations from L1/L2 analysts, and coordinate response actions. - Serve as the technical expert for SOC operations, threat detection, and remediation. Key...

  • SOC Engineer

    7 days ago


    New Delhi, India ITC Infotech Full time

    SOC Engineer - L3Location: Hyderabad Mode: HybridRole Summary Act as the senior-level analyst responsible for handling complex security incidents and advanced threats. Lead investigations, triage escalations from L1/L2 analysts, and coordinate response actions. Serve as the technical expert for SOC operations, threat detection, and remediation. Key...

  • SOC Analyst L2/L3

    4 days ago


    New Delhi, India Innova ESI Full time

    Job Location - MumbaiOpen Positions: SOC Analyst Level 2 (L2) SOC Analyst Level 3 (L3)Please refer to the job description below for your kind reference:️ SOC Analyst – Level 2 (L2) / Level 3 (L3)Primary Responsibilities: Deep-dive investigation of escalated incidents Conduct root cause analysis and threat containment Coordinate with IT, DevOps, and other...

  • SOC Level 1 Analyst

    1 week ago


    New Delhi, India Cysigil Full time

    SOC Level 1 Analyst Location:Bengaluru, India Experience:0–3 Years Employment Type:Full-Time (Onsite Only)About the RoleWe are hiring aSecurity Operations Center (SOC) Level 1 Analystfor a full-time onsite role. As a front-line cyber defender, you will monitor, analyze, and respond to security events using industry-leading tools likeElastic SIEM ,Microsoft...

  • SOC Analyst L2/L3

    4 days ago


    Delhi, India Innova ESI Full time

    Job Location - MumbaiOpen Positions:SOC Analyst Level 2 (L2)SOC Analyst Level 3 (L3)Please refer to the job description below for your kind reference:️ SOC Analyst – Level 2 (L2) / Level 3 (L3)Primary Responsibilities:Deep-dive investigation of escalated incidentsConduct root cause analysis and threat containmentCoordinate with IT, DevOps, and other...

  • SOC Lead

    1 week ago


    New Delhi, India ITC Infotech Full time

    SOC LeadLocation: Bangalore Mode: HybridRole Summary: Lead and manage day-to-day SOC operations to ensure proactive detection and response to cyber threats. Drive operational excellence, process maturity, and automation across SOC functions. Coordinate incident response, threat intelligence, and security monitoring for enterprise or customer environments.Key...

  • Cyber Security

    3 weeks ago


    New Delhi, India Sanganan IT Solutions Pvt Ltd. Full time

    Job Title:Team Lead - Security Operations Center (SoC)Location: Noida/Singapore OfficeWORK FROM NOIDA OFFICE, PLEASE DON'T APPLY IF YOU ARE LOOKING FOR HYBRID OR WORK FROM HOME Short notice period or immediate joiners are preferred.Job Overview: As the SOC Team Lead, you will oversee the daily operations and strategic direction of a multi-tiered Security...

  • Soc Analyst

    1 week ago


    Delhi, Delhi, India Airtel Full time ₹ 12,00,000 - ₹ 36,00,000 per year

    Role & responsibilitiesDark Web Monitoring & AnalysisContinuously monitor dark web, deep web, and surface web sources using CloudSEK and other threat intelligence tools for indicators of compromise (IOCs), credential dumps, leaked data, and potential threats targeting the customer.Identify and analyze mentions of the customers brand, infrastructure, domains,...

  • Soc Analyst

    4 days ago


    Delhi, NCR, India Airtel Full time ₹ 9,00,000 - ₹ 12,00,000 per year

    Managed Services SOC ManagerJob Summary:The Security Operations Center (SOC) Security L-1 Analyst serves in a SOC team, is responsible for conducting information security investigations as a result of security incidents identified by the Level-1 security analysts who are monitoring the security consoles from various SOC entry channels (SIEM, Tickets, Email...

  • SOC Lead

    1 week ago


    New Delhi, India Art Technology and Software Full time

    Role Overview The SOC Lead serves as a senior member of the Monitoring and Threat Detection function. This role focuses on high-quality incident triage, technical escalation management, continuous improvement of detection capabilities, and leading incident analysis across enterprise-wide environments. The SOC Lead mentors L1/L2 analysts, ensures SLA...