SOC L3
2 days ago
**Want to be a part of our team?**
Provides technical support to field engineers, technicians, and product support personnel who are diagnosing, troubleshooting, repairing, and debugging complex electro/mechanical equipment, computer systems, complex software, or networked and/or wireless systems.
Responds to situations where first-line product support has failed to isolate or fix problems in malfunctioning equipment or software. Reports design, reliability, and maintenance problems or bugs to design engineering/software engineering. May be involved in customer installation and training.
Provides support to customers/users where the product is highly technical or sophisticated in nature.
**SOC L#**
The SOC L3 is responsible for providing service to clients by proactively identifying and resolving technical incidents and problems. Through preemptive service incident and resolution activities, as well as product reviews, operational improvements, operational practices, and quality assurance this role will maintain a high level of service to clients. Their primary objective is to ensure zero missed service level agreement (SLA) conditions. The SOC L3 is responsible for managing tickets of low to high complexity.
**Key Roles and Responsibilities**:
NG SIEM (SIEM+SOAR+UEBA) Tool Overall Administration, Management, Backup & Archival, Troubleshooting
- Upgrade/Update/Patching of NG SIEM Solution
- Monitor NG SIEM Console & Dashboards and provide response & support to remote SOC team for Incidents.
- Support the day to day operation of deployed NG SIEM.
- Perform initial analysis for known issues and provide the appropriate recommendations for closure.
- Monitor & Reporting of system components health and take necessary action in case of any observed issue.
- Perform analysis on the reported incidents, determine the root
- cause, and recommend the appropriate solution.
respective version upgrade(s)
- Develop appropriate use cases/playbooks/models/reports and
alerts & develop custom parsers/connectors for integrating logswherever necessary or required.
- Integration of SIEM/SOAR/UEBA Tool with security/non-security
recommendation for standardizing the NG SIEM Solution.
- Reduction of False Positives by fine tuning existing correlation
- rules/configuration/playbooks/models
- Automation with continuous improvements, Reduction in MTTR,
MTTD
- Develop and implement processes for interfacing with operational
teams and other supporting teams.
- Ensure the NG SIEM integration is intact among the Client SOC
solutions, other assets
- Design, create and customize the dashboards as per the client
requirements.
- Ensure the necessary client SOC documents like operating
procedures, configuration management, Low Level Design etc. areup to date with the changes made in their respective areas.
- Automating Day to Day Tasks related with NG SIEM Operations (but
not limited to)
- Above is illustrative list of general activities. All Technology specific
activities Related to NG SIEM to be carried out.
recommendation for standardizing the NGSIEM Solution.
- Ensure the SIEM integration is intact among the SOC
solutions, other assets
- Design, create and customize the dashboards/reports as per the
client requirements.
- Support on boarding and maintenance of a wide variety of data
- Create and manage NG SIEM knowledge objects to include apps,
dashboards, saved and scheduled searches and alerts.
- Support access requests and modifications and permissions
- Support troubleshooting and remediation of issues as they arise
with data ingestion and NG SIEM infrastructure
- Work on Improvement of overall posture of NG SIEM deployment
to achieve Best return on investment.
- Monitor & report on cyber threats and suggest any changes needed
to protect the organization in SIEM, Leading End-to-EndImplementation of the suggested changes.
- Should have a very good understanding on MITRE attack & NIST
framework.**Threat Hunting Requirements**
Use algorithms and tools to actively hunt of attacks in large volume
of data and create alerts that are passed on to analysts.
2. Define, develop, implement, update and maintain Hunting
Framework which contains: Create Strategic Hunt Missions which
are objective based to identify malicious activity that has not
triggered an alert. Search for Indicators of Compromise received
from Threat Intelligence and Analytics
3. Create knowledge base of IOCs
4. The service should able to detect threats from various attacks
watering hole attacks, DNS attacks, insider threat, and data
exfiltration but not limited to. List the detection use cases which can
detect above attacks using pre-built machine learning techniques
and analytical models.
5. Analytics using machine learning techniques should use multiple
sources to identify malicious activity. A minimum the following
sources should be used but not limited to:
IPS/IDS, Proxy, FW, WAF, Anti APT, EDR, AV, Internet/Mail gateway,
Windows & Linux logs, DN
-
SOC L3 Analyst
5 days ago
Bengaluru, Karnataka, India Hinduja Global Solutions (HGS) Full time ₹ 12,00,000 - ₹ 36,00,000 per yearJob DescriptionThe SOC L3 Analyst is a senior-level position responsible for handling the most complex security incidents and providing strategic direction for the SOC team. This role involves leading shifts, mentoring junior analysts, and providing strategic oversight to ensure effective detection, analysis, and response to security incidents. The L3...
-
Cyber Security Lead Analyst-SOC
3 weeks ago
Bengaluru, India Société Générale Assurances Full timeCyber Security Lead Analyst-SOC IT (Information Technology) Permanent contract Bangalore, India Hybrid Reference 24000LLG Start date Immediately Publication date 2025/05/20 Responsibilities 1. JOB PURPOSE RESG/GTS is the entity in charge of the entire IT infrastructure of Société Générale. The RESG/GTS/SEC/SOC department, which corresponds to the...
-
Soc L3 Incident Handler
2 weeks ago
Bengaluru, India Tata Consultancy Services Full timeRole: Soc L3 Incident Handler Exp: 10+years Location: Bangalore Interview Mode: Virtual (Teams) Interview Date: 15-Nov-2025 Job Description: Primary Skill: (Must Have) Experience in Cyber Threat incident response, vulnerability research, malware analysis and exploit investigation. Demonstrated experience in computer security related disciplines, including...
-
Soc L3 Incident Handler
2 weeks ago
Bengaluru, India Tata Consultancy Services Full timeRole: Soc L3 Incident HandlerExp: 10+yearsLocation: BangaloreInterview Mode: Virtual (Teams)Interview Date: 15-Nov-2025Job Description:Primary Skill: (Must Have)- Experience in Cyber Threat incident response, vulnerability research, malware analysis and exploit investigation.- Demonstrated experience in computer security related disciplines, including but...
-
Soc L3 Incident Handler
2 weeks ago
Bengaluru, India Tata Consultancy Services Full timeRole: Soc L3 Incident Handler Exp: 10+years Location: Bangalore Interview Mode: Virtual (Teams) Interview Date: 15-Nov-2025 Job Description: Primary Skill: (Must Have) Experience in Cyber Threat incident response, vulnerability research, malware analysis and exploit investigation. Demonstrated experience in computer security related disciplines, including...
-
Soc L3 Incident Handler
3 weeks ago
Bengaluru, India Tata Consultancy Services Full timeRole: Soc L3 Incident HandlerExp: 10+yearsLocation: BangaloreInterview Mode: Virtual (Teams) Interview Date: 15-Nov-2025Job Description:Primary Skill: (Must Have) Experience in Cyber Threat incident response, vulnerability research, malware analysis and exploit investigation. Demonstrated experience in computer security related disciplines, including but not...
-
Soc L3 Incident Handler
3 weeks ago
Bengaluru, India Tata Consultancy Services Full timeRole: Soc L3 Incident Handler Exp: 10+years Location: Bangalore Interview Mode: Virtual (Teams) Interview Date: 15-Nov-2025 Job Description: Primary Skill: (Must Have) - Experience in Cyber Threat incident response, vulnerability research, malware analysis and exploit investigation. - Demonstrated experience in computer security related disciplines,...
-
Soc L3 Incident Handler
3 weeks ago
Bengaluru, India Tata Consultancy Services Full timeRole: Soc L3 Incident HandlerExp: 10+yearsLocation: BangaloreInterview Mode: Virtual (Teams) Interview Date: 15-Nov-2025Job Description:Primary Skill: (Must Have) Experience in Cyber Threat incident response, vulnerability research, malware analysis and exploit investigation. Demonstrated experience in computer security related disciplines, including but not...
-
Soc L3 Incident Handler
3 weeks ago
Bengaluru, India Tata Consultancy Services Full timeRole: Soc L3 Incident HandlerExp: 10+yearsLocation: BangaloreInterview Mode: Virtual (Teams) Interview Date: 15-Nov-2025Job Description:Primary Skill: (Must Have) Experience in Cyber Threat incident response, vulnerability research, malware analysis and exploit investigation. Demonstrated experience in computer security related disciplines, including but not...
-
SOC Lead
4 weeks ago
Bengaluru, India ITC Infotech Full timeSOC LeadLocation: BangaloreMode: HybridRole Summary:Lead and manage day-to-day SOC operations to ensure proactive detection and response to cyber threats.Drive operational excellence, process maturity, and automation across SOC functions. Coordinate incident response, threat intelligence, and security monitoring for enterprise or customer environments. Key...