Soc L3 Incident Handler
2 weeks ago
Role: Soc L3 Incident HandlerExp: 10+yearsLocation: BangaloreInterview Mode: Virtual (Teams) Interview Date: 15-Nov-2025Job Description:Primary Skill: (Must Have) Experience in Cyber Threat incident response, vulnerability research, malware analysis and exploit investigation. Demonstrated experience in computer security related disciplines, including but not limited to the following subject areas: software vulnerabilities and exploitation, host forensics, malware analysis, network traffic analysis, Insider Threat and web-focused security topics. Knowledgeable about modern security related subjects and trends, for example, Advanced Persistent Threat (APT), Spear Phishing, and credential compromise techniques Proven ability to drive large scale, high visibility projects with high collaboration and leadership Excellent judgment, decision making skills, and the ability to work under pressure Excellent written and oral communication skills Excellent presentation skills and experience of presenting to senior management Solid understanding of events, related fields in log records and alerts reported by various data sources such as Windows/Unix systems, IDS/IPS, AV, HIDS/HIPS, WAFs, firewalls, and web proxies Develop and improve the existing EDR Specific usecases for enhanced detection. Analyze the TTP's of the emerging threats and co-ordinate with the EDR team to develop use cases at EDR. Closely co-ordinate and provide continuous support for CSIRT team in an event of a P1/P2 Security Incidents. Conduct a Security Incident tabletop simulation internally with in SOC to gauge the process and track improvements. Handle BEC emails targeted against VIP users within the Organization Description – Use Case Development: Knowledge of organizational risks and threats to design relevant and effective detection rules. Log Sources: Understanding log formats, sources, and parsing for accurate data utilization in use cases. SIEM and Analytics Tools: Familiarity with platforms like Securonix, Sentinel, or Splunk to implement and monitor use cases. Alert Logic: Ability to define thresholds, logic, and conditions to reduce false positives and improve detection accuracy. Incident Response Needs: Awareness of incident response workflows to align use cases with actionable intelligence. Performance Metrics: Skills to create and optimize KPI/KRI reports to track detection and response performance. Fine-Tuning Methodology: Experience in analyzing alert data to refine use cases and adjust logic periodically. Detect and respond to company-wide security incidents, coordinating cross-functional teams to mitigate and eradicate threats. Incident response lead for high impact cyber security incidents Triage events, escalations and incidents to determine remediation and resolution actions Coordinate appropriate response activities across teams or directly with stakeholders to rapidly remediate potential threats Develop playbooks to improve processes and information sharing across teams Initiative and project-related support to provide Security Operations and Incident Response perspective and subject matter expertise Contribute technical and process improvements within the team Participate in current operations, on call rotation. Which includes some after-hours responsibilities and escalations.
-
SOC L3 Analyst
2 weeks ago
bangalore, India Hinduja Global Solutions (HGS) Full timeJob DescriptionThe SOC L3 Analyst is a senior-level position responsible for handling the most complex security incidents and providing strategic direction for the SOC team. This role involves leading shifts, mentoring junior analysts, and providing strategic oversight to ensure effective detection, analysis, and response to security incidents. The L3...
-
SOC Lead
10 hours ago
bangalore, India ITC Infotech Full timeSOC LeadLocation: BangaloreMode: HybridRole Summary:Lead and manage day-to-day SOC operations to ensure proactive detection and response to cyber threats.Drive operational excellence, process maturity, and automation across SOC functions. Coordinate incident response, threat intelligence, and security monitoring for enterprise or customer environments. Key...
-
SOC Lead
3 weeks ago
bangalore, India ITC Infotech Full timeSOC Lead Location: Bangalore Mode: Hybrid Role Summary: Lead and manage day-to-day SOC operations to ensure proactive detection and response to cyber threats. Drive operational excellence, process maturity, and automation across SOC functions. Coordinate incident response, threat intelligence, and security monitoring for enterprise or customer environments....
-
SOC Manager
2 weeks ago
Bangalore, India Mitigata™ - Smart cyber insurance Full timeJob Title: SOC Manager Experience Required: 10+ Years Location: Bengaluru Department: Cyber Security / Security Operations Employment Type: Full-time About the Role We are looking for a highly experienced SOC Manager to lead our Security Operations Center and manage day-to-day security monitoring, incident response, and threat management activities. The...
-
SOC Manager
2 weeks ago
bangalore, India Mitigata™ - Smart cyber insurance Full timeJob Title: SOC Manager Experience Required: 10+ Years Location: Bengaluru Department: Cyber Security / Security Operations Employment Type: Full-timeAbout the Role We are looking for a highly experienced SOC Manager to lead our Security Operations Center and manage day-to-day security monitoring, incident response, and threat management activities. The ideal...
-
Security Operations Center Analyst
2 weeks ago
bangalore, India Innova ESI Full timeRole: SOC Analyst (L2/L3)Experience: 4 -12 YearLocation: MumbaiJob Description:Key Responsibilities:Perform real-time security monitoring, analysis, and incident response for enterprise systems, networks, and applications.Investigate security alerts and correlate events using SIEM tools (e.g., Splunk, QRadar, ArcSight, Azure Sentinel).Conduct threat hunting,...
-
SOC Analyst 1
2 weeks ago
bangalore, India UST Full timeDear Candidates, UST is looking for a SOC Analyst 1 with 2-4 years of exp. Required Experience : 2- 4Years NP : Immediate to 20 days only Location: Only Trivandrum, Kerala. Interested candidate can share your updated CV to bhoopathyraja.ravindran@ust.com JD We are seeking a detail-oriented and proactive SOC Analyst – Level 1 to support 24x7 security...
-
SOC Analyst 1
2 weeks ago
bangalore, India UST Full timeDear Candidates,UST is looking for a SOC Analyst 1 with 2-4 years of exp.Required Experience : 2- 4YearsNP : Immediate to 20 days onlyLocation: Only Trivandrum, Kerala.Interested candidate can share your updated CV to bhoopathyraja.ravindran@ust.comJDWe are seeking a detail-oriented and proactive SOC Analyst – Level 1 to support 24x7 security monitoring...
-
SOC Level 1 Analyst
3 weeks ago
bangalore, India Cysigil Full timeSOC Level 1 Analyst Location: Bengaluru, India Experience: 0–3 Years Employment Type: Full-Time (Onsite Only) About the Role We are hiring a Security Operations Center (SOC) Level 1 Analyst for a full-time onsite role. As a front-line cyber defender, you will monitor, analyze, and respond to security events using industry-leading tools like Elastic SIEM ,...
-
Senior Analyst SOC L2
3 weeks ago
Bangalore, India Jobted IN C2 Full timeAbout Company Choosing Capgemini means choosing a company where you will be empowered to shape your career in the way you’d like, where you’ll be supported and inspired by a collaborative community of colleagues around the world, and where you’ll be able to reimagine what’s possible. Join us and help the world’s leading organizations unlock the...