L2/L2.5 Security Operations Center

15 hours ago


Chennai, Tamil Nadu, India TOCUMULUS Full time ₹ 15,00,000 - ₹ 19,00,000 per year

Position Overview

We are seeking a skilled and detail-oriented L2/L2.5 Security Operations Center (SOC) Analyst to join our Security Operations team. This role sits at the critical intersection of threat detection, incident investigation, and escalation management. The successful candidate will be responsible for identifying, investigating, and responding to security threats while mentoring L1 analysts and collaborating with senior security teams.

Position Type: Full-time

Location: [On-site / Hybrid / Remote]

Experience Level: 8 years in cybersecurity/SOC operations.

Key Responsibilities

Tier 2 Incident Analysis & Investigation (45%)

Alert Triage & Investigation:

· Analyze and investigate alerts/incidents escalated from L1 analysts

· Determine incident severity, scope, and impact on business operations

· Conduct root cause analysis for security events and anomalies

· Perform deep-dive forensic analysis on suspicious activities

· Create detailed incident investigation reports with findings and recommendations

Threat Assessment:

· Classify and categorize threats (malware, ransomware, APT, credential theft, data exfiltration, etc.)

· Evaluate threat credibility and validate true positives vs. false positives

· Assess threat actor capabilities, tactics, techniques, and procedures (TTPs)

· Determine data exposure and potential impact on organization

Incident Containment & Response:

· Execute immediate containment measures to prevent threat propagation

· Isolate affected systems from network when necessary

· Coordinate with IT Operations for system remediation and recovery

· Recommend and implement mitigation strategies

· Participate in incident response playbook execution

SIEM & Security Tool Management (25%)

SIEM Platform Operations:

· Monitor and manage SIEM (Security Information and Event Management) platform

· Create, modify, and optimize detection rules and correlation searches

· Develop custom dashboards and reports for security monitoring

· Tune alert thresholds to reduce false positives while maintaining detection sensitivity

· Maintain SIEM data integrity and log ingestion from all security sources

Security Tool Administration:

· Manage and maintain EDR (Endpoint Detection & Response) solutions

· Monitor firewall logs, IDS/IPS alerts, and network anomalies

· Review and escalate VPN access anomalies and unusual traffic patterns

· Manage DLP (Data Loss Prevention) incidents and policy violations

· Monitor and respond to vulnerability scanner findings and exploit attempts

Log Analysis & Threat Hunting:

· Perform manual log analysis to identify suspicious patterns and anomalies

· Conduct proactive threat hunting campaigns based on threat intelligence

· Search for indicators of compromise (IOCs) across infrastructure

· Analyze logs from Windows/Linux systems, applications, and network devices

· Create hunt packages and queries for recurring threat patterns

Escalation & Ticket Management (15%)

Alert Routing & Escalation:

· Escalate incidents to L3 analysts and specialized teams (incident response, forensics, threat intelligence)

· Determine appropriate escalation path based on incident severity and type

· Provide clear handoff documentation to specialized teams

· Monitor ticket status through resolution

· Perform quality assurance on closed tickets

Ticket Management:

· Document all investigations in ticketing system with comprehensive notes

· Maintain incident timeline and evidence chain of custody

· Update incident status and metrics tracking

· Meet SLA requirements for investigation and escalation (typically 4-8 hours for critical incidents)

· Generate metrics reports for team and management review

L1 Analyst Support & Mentoring (10%)

Knowledge Transfer:

· Mentor L1 analysts on investigation techniques and procedures

· Review L1 investigations and provide feedback for improvement

· Create runbooks and playbooks for common incident types

· Conduct training sessions on new threats, tools, and procedures

· Share threat intelligence and best practices with SOC team

Quality Assurance:

· Review L1 alert dispositions and investigation quality

· Identify gaps in L1 knowledge and provide targeted training

· Validate that proper procedures are followed

· Suggest process improvements based on L1 experiences

Technical Competencies

Required Skills (Must Have)

Security Operations:

· 3-5 years experience in SOC, threat detection, or incident response

· Proficiency with SIEM platforms (Splunk, ArcSight, QRadar, or similar)

· Hands-on experience with EDR solutions (CrowdStrike, Microsoft Defender, SentinelOne)

· Strong understanding of security frameworks (MITRE ATT&CK, NIST Cybersecurity Framework)

· Knowledge of incident response processes and procedures

· Experience with security monitoring tools and techniques

Technical Knowledge:

· Strong understanding of networking (TCP/IP, DNS, HTTP/HTTPS, VPN, firewalls)

· Windows and Linux system administration fundamentals

· Knowledge of common attack vectors and threat landscape

· Ability to read and interpret logs (Windows Event Logs, Syslog, firewall logs, web logs)

· Understanding of malware analysis concepts (static vs. dynamic analysis)

· Basic scripting knowledge (Python, Bash, or PowerShell) for automation tasks

Analytical Skills:

· Excellent analytical and problem-solving abilities

· Strong attention to detail and accuracy

· Ability to work through complex investigations methodically

· Data-driven decision making

· Pattern recognition and anomaly detection capabilities

Communication & Documentation:

· Excellent written communication for incident reports and escalations

· Ability to clearly explain technical findings to non-technical stakeholders

· Strong documentation and note-taking practices

· Clear verbal communication with team members and other departments

Desired Skills (Nice to Have)

· Threat Intelligence: Experience consuming and applying threat intelligence

· Advanced Forensics: Digital forensics or malware analysis experience

· Automation: Experience with Python, Ansible, or similar for playbook automation

· Cloud Security: Experience with AWS, Azure, or GCP security monitoring

· Certifications: GIAC Security Essentials (GSEC), CEH, Security+, CISSP, or similar

· Incident Response: Prior incident response team experience

· Vulnerability Management: Experience with vulnerability assessment and remediation

· Compliance: Knowledge of compliance frameworks (PCI-DSS, HIPAA, SOC 2, ISO 27001



  • Chennai, Tamil Nadu, India Indium software Full time ₹ 15,00,000 - ₹ 25,00,000 per year

    Job InformationDate Opened09/25/2025Job TypePermanentRSD NO11929IndustryIT ServicesMin Experience5Max Experience8CityChennaiState/ProvinceTamil NaduCountryIndiaZip/Postal Code600018Job DescriptionRole: L2.5/L3 Application Maintenance & Support Engineer (Investment Management Domain) Responsibilities: Provide advanced application support: analyze, debug, and...


  • Chennai, Tamil Nadu, India Sattrix Information Security Full time ₹ 6,00,000 - ₹ 18,00,000 per year

    Network Security Engineer L2Location: Chennai and HyderabadEmployment Type: Full-timeShifts: Rotational ShiftsWork Mode: Work from OfficeExperience:At least 4 to 6 Years of experience out of which, minimum 5 years' experience in Security device management and operation.Technical Skills & ToolsMandatory: WAF: F5Preferred (any 2–3):Proxy: SkyHigh, Zscaler...


  • Chennai, Tamil Nadu, India Sattrix Information Security Full time ₹ 18,00,000 per year

    • Position:Device management L2 Support Engineers• Location:Mumbai• Work Mode & Shifts:Work from office (rotational shifts)• Budget:15-18 LPA• Experience:At least 5 Years of experience out of which, minimum 4 years of relevant experience in Endpoint Security domain.Skill required (combination of any 2/3 skills):Sentinal OneCarbon BlackAruba -...

  • IDM Engineer

    2 weeks ago


    Chennai, Tamil Nadu, India Sattrix Information Security Full time ₹ 7,20,000 - ₹ 8,64,000 per year

    Device Management (IDM) Support Engineers – L1 & L2Location: ChennaiEducation:B.E. / B.Tech / MCAExperience:L1 - 2–4 years (1 year in Security Device Management)L2 - 4–6 years (5 years in Security Device Management)Budget:L16-7 LPAL215-18 LPASkills required - IDM (combination of any 2/3):Forcepoint - DLPRSAFIM - Trellix/TripwireSeclorePIM - Arcon /...


  • Chennai, Tamil Nadu, India Buzzworks Business Services Full time ₹ 5,00,000 - ₹ 12,00,000 per year

    Role OverviewWe are seeking an experienced L2 Engineer with strong expertise in cloud contact center solutions, telecom protocols, and implementation projects. The role involves troubleshooting, implementing, and supporting customer deployments of cloud-based contact center platforms, ensuring seamless integration with enterprise telephony and IT systems.Key...


  • Chennai, Tamil Nadu, India Mindsprint Full time ₹ 1,50,00,000 - ₹ 4,50,00,000 per year

    Position :Director – Head of Security Operations CenterLocation :ChennaiKey Competencies:Strategic Vision – Ability to align SOC service evolution with MSSP business objectives.Technical Skills – Deep understanding of modern detection and response tools, automation, and integration frameworks.Client Orientation – Skilled in stakeholder engagement,...

  • Network Engineer L2

    2 days ago


    Chennai, Tamil Nadu, India HCLTech Full time ₹ 9,00,000 - ₹ 12,00,000 per year

    We do have an opening for the role of Network Operations Support Engineer L2 with an MNC in the IT Sector.Experience level 3-7 yearsWork Mode: Hybrid (3 days work from office out of 5 working days)Notice Period: 0- 30 DaysWork Location: Chennai ( Chengalpattu)Skill: LAN/WAN/WLAN, routing, switching, Firewall, VPN, IPS/IDS Infrastructure Administration and L2...


  • Chennai, Tamil Nadu, India Exela Technologies Full time ₹ 12,00,000 - ₹ 36,00,000 per year

    Job Description:Leadership & StrategyLead and mentor the incident response (IR) team, fostering a culture of continuous improvement and collaboration.Develop, implement, and maintain the organization's incident response strategy, processes, and playbooks.Act as the primary escalation point for significant cybersecurity incidents.Incident ManagementOversee...

  • Network Engineer L2

    15 hours ago


    Chennai, Tamil Nadu, India Shri Consultancy Services Full time ₹ 40,00,000 - ₹ 80,00,000 per year

    Job Title: Network Engineer - L2 & L3Job Summary:The Network engineer support Level 2/3 position is a key contributor in the success of managing our client's networks. This is achieved by quickly resolving incidents that our clients open tickets for and by constantly monitoring the alerts generated by our tools to resolve incidents before our clients are...


  • Chennai, Tamil Nadu, India Voicecord Full time ₹ 33,00,000 - ₹ 45,00,000 per year

    Line Manager: Core ManagerJob title: Emergency Desk EngineerJob Abbreviation: L2 Engineer for Emergency (000) desk supportJob Family: Emergency Desk Engineer – L2Job Profile Definition:KPI Performance Monitoring: · Monitor Emergency dashboards for success & failures and initiate incidents for threshold breaches. · Callout to respective stakeholders...