Security Operations Center Lead

2 days ago


Gurgaon, Haryana, India Rexoreo Consulting Full time ₹ 15,00,000 - ₹ 25,00,000 per year

____________________________________________________________________________

- PLEASE SAVE WHATSAPP # Ashima)/ Nishant)

- Ashima/ Nishant/Shreedevi is your POC from RexOreo Pvt Ltd.

-Queries : All emails will come from id : , so please keep an eye.

_____________________________________________________________________________

Top Selection & Auto Elimination Criteria:

  • Only Delhi NCR Candidates Need to apply as we need Only Immediate joiners (0-30 days)
  • Rotational Shift
  • Cab facility : Yes only late night pick or drop(1 side only for Gurgaon Employees)
  • Location : Gurgaon
  • Mode : 5 days work from Office only
  • Relevant experience range 9+
  • Position : L3 SOC Analyst
  • Experience : 9-14 years
  • Only Current L2/L2+ (more than 2 years) or L3 candidates need to apply
  • Experience in QRadar is mandatory
  • Total Open Positions : 5**
  • EMAIL @ ,com : A VOICE NOTE WHY YOU ARE FIT FOR THIS ROLE

___________________________________________________________________________

Position Description:

The SOC Level 3 Analyst is a senior-level cybersecurity professional responsible for leading advanced threat detection, response, and mitigation activities within the Security Operations Center. This role acts as the final escalation point for complex security incidents and plays a crucial role in enhancing security monitoring, incident response procedures, and overall threat defense capabilities. The L3 Analyst collaborates with security engineers, incident response teams, threat intelligence analysts, and IT stakeholders to identify, investigate, and remediate security threats in real-time.

Role and responsibilities:

  1. Incident Response and Escalation

  2. Lead and coordinate end-to-end response for critical and high-severity security incidents.

  3. Perform advanced investigation and forensics on compromised systems, including log correlation, packet analysis, and endpoint review.
  4. Serve as a primary escalation point for SOC Tier 1 and Tier 2 analysts.
  5. Conduct root cause analysis and provide detailed incident reports with lessons learned and mitigation steps.

  6. Threat Detection and Analysis

  7. Analyze and triage alerts generated by the SIEM and other security tools.

  8. Hunt for threats in the environment using threat intelligence and behavioral indicators (proactive threat hunting).
  9. Analyze and reverse-engineer malware, if required, to understand behavior and determine mitigation steps.
  10. Correlate threat intelligence feeds with internal data to identify indicators of compromise (IOCs) and advanced persistent threats (APTs).

  11. Tooling and Automation

  12. Optimize and fine-tune detection rules and SIEM use cases to reduce false positives and enhance detection accuracy.

  13. Build automation scripts and workflows to improve efficiency in incident triage, correlation, and response.
  14. Collaborate with security engineers to integrate new data sources and tools into the SOC ecosystem.

  15. Documentation and Reporting

  16. Maintain detailed and accurate documentation of incidents, investigations, and actions taken.

  17. Develop and update SOC standard operating procedures (SOPs) and playbooks.
  18. Prepare and present technical reports, dashboards, and metrics to senior management and stakeholders.

  19. Mentorship and Leadership

  20. Mentor and guide SOC L1 and L2 analysts on technical skills and investigative processes.

  21. Provide training on new threats, tools, and techniques.
  22. Assist in evaluating and improving team workflows, processes, and overall SOC maturity.

  23. Collaboration and Stakeholder Engagement

  24. Work closely with threat intelligence, vulnerability management, and risk teams to stay ahead of emerging threats.

  25. Communicate with IT, DevOps, and business units to coordinate responses and ensure secure configurations.
  26. Participate in red/blue team exercises and post-mortem reviews to enhance SOC readiness.

Required Experience / Skills:

  • Strong expertise with SIEM platforms (e.g., QRadar, Sentinel, LogRhythm , Splunk,).
  • Proficient in EDR and XDR tools (e.g., CrowdStrike, SentinelOne, Carbon Black).
  • Hands-on knowledge of packet capture analysis tools (e.g., Wireshark, tcpdump), forensic tools, and malware analysis tools.
  • Familiarity with scripting or automation languages such as Python, PowerShell, or Bash.
  • Deep understanding of networking protocols, OS internals (Windows/Linux), and security best practices.
  • Familiar with frameworks such as MITRE ATT&CK, NIST, and the Cyber Kill Chain.
  • Minimum of nine (9) years technical experience

  • 7+ years of experience in SOC, security operations, cyber technical analysis, threat hunting, and threat attribution assessment with increasing responsibilities.

  • 3+ years of rule development and tuning experience
  • 2+ years of Incident response

  • Experience supporting 24x7x365 SOC operations and willing to operate in Shifts including but not limited to Alert and notification activities- analysis/triage/response, Review and action on Threat Intel for IOCs and other operationally impactful information, initial review and triage of reported alerts and Incidents.

  • Manage multiple tickets/alerts in parallel, including end-user coordination.
  • Demonstrated ability to evaluate events (through a triage process) and identify appropriate prioritization for response.
  • Solid understanding and experience analyzing security events generated from security tools and devices not limited to QRadar, MS Sentinel, FireEye, Elastic, SourceFire, Malware Bytes, CarbonBlack/Bit9, Splunk, Prisma Cloud/Compute, Cisco IronPort, BlueCoat
  • Experience and solid understanding of Malware analysis
  • Demonstrated proficiencies with one or more toolsets such as QRadar, MS Sentinel, Bit9/CarbonBlack, Endgame, FireEye HX / CM / ETP, Elastic Kibana
  • Experience and ability to use, contribute, develop and follow Standard Operating Procedures (SOPs)
  • In-depth experience with processing and triage of Security Alerts from multiple sources but not limited to: Endpoint security tools, SIEM, email security solutions, CISA, Threat Intel Sources
  • Experience with scripting languages applied to SOC operations; for example, automating investigations with tools, automating IOC reviews, support SOAR development.
  • Experience with bash, python, and Windows PowerShell scripting
  • Demonstrated experience with triage and resolution of SOC tasks, including but not limited to vulnerability announcements, phishing email review, Tier 1 IR support, SIEM/Security Tools - alert analysis.
  • Demonstrated experience and understanding of event timeline analysis and correlation of events between logs sources.
  • Demonstrated experience with the underlying logs generated by operating systems (Linux/Windows), Network Security Devices, and other enterprise tools.
  • Demonstrated proficiencies with an enterprise SIEM or security analytics solution, including the Elastic Stack or Splunk.
  • Solid understanding and experience analyzing security events generated from security tools and devices not limited to: QRadar, MS Sentinel, Carbon Black, FireEye, Palo Alto, Cylance, and OSSEC
  • Expert in security incident response processes

Required Certifications: Two of the following certifications are preferred:

  • GIAC-GCIH Global Certified Incident Handler
  • GIAC-GCFE - Global Information Assurance Certification Forensic Examiner
  • GIAC-GCFA - Global Information Assurance Certification Forensic Analyst
  • GIAC-GREM - GIAC Reverse Engineering Malware
  • GIAC-GNFA - GIAC Network Forensic Analyst
  • GIAC-GCTI - GIAC Cyber Threat Intelligence
  • GIAC-GPen GIAC Certified Penetration Tester
  • GIAC-GWAPT GIAC Certified Web Application Penetration Tester
  • CEPT - Certified Expert Penetration Tester (CEPT)
  • CASS - Certified Application Security Specialist (CASS)
  • CWAPT - Certified Penetration Tester (CWAPT)
  • CREA - Certified Reverse Engineering Analyst (CREA)

Qualifications:

  • Bachelors degree in computer science, Information Technology, or a related field.
  • Experience of 5 years or 3 years relevant experience.
  • Strong troubleshooting and problem-solving skills.
  • Excellent communication and interpersonal skills.
  • Ability to work independently and as part of a team.
  • Strong organizational and time management skills.
  • Willingness to work after hours and provide on-call support.


  • Gurgaon, Haryana, India eSec Forte® Technologies Full time ₹ 9,00,000 - ₹ 12,00,000 per year

    Experiene:2-5 yearsRole DescriptionThis is a full-time on-site role for a Security Operations Center Analyst located in Gurugram. The Security Operations Center Analyst will be responsible for monitoring and analyzing security events, conducting cyber threat hunting, generating cyber threat intelligence reports, and responding to security incidents. Other...


  • Gurgaon, Haryana, India Google Operations Center Full time ₹ 20,00,000 - ₹ 25,00,000 per year

    Join UsAt Google Operations Center we help Google users and customers solve problems and achieve their goals—all while enjoying a culture focused on improving continuously and being better together. We work hard, we play hard, and we want you to join usAs a Tech Process Team Lead, you will serve as a strategic leader and resource for the email production...


  • Gurgaon, Haryana, India Intellect Design Arena Ltd Full time ₹ 12,00,000 - ₹ 36,00,000 per year

    Job Title:Security Operations Center (SOC) LeadLocation:Chennai/ GurgaonShift:Rotational Shifts (including minimal night shifts)About Intellect Design Arena:Intellect Design Arena is a global leader in financial technology for banking, insurance, and other financial services. We deliver cutting-edge digital solutions to global clients by combining deep...


  • Gurgaon, Haryana, India Google Operations Center Full time ₹ 12,00,000 - ₹ 36,00,000 per year

    Join UsAt Google Operations Center we help Google users and customers solve problems and achieve their goals—all while enjoying a culture focused on improving continuously and being better together. We work hard, we play hard, and we want you to join usWe are seeking an experienced and highly motivated Transition lead to join our team in India. This role...


  • Gurgaon, Haryana, India eSec Forte® Technologies Full time ₹ 9,00,000 - ₹ 12,00,000 per year

    Role DescriptionThis is a full-time on-site role for a Security Operations Center Analyst located in Gurugram. The Security Operations Center Analyst will be responsible for monitoring and analyzing security events, conducting cyber threat hunting, generating cyber threat intelligence reports, and responding to security incidents. Other tasks include...


  • Gurgaon, Haryana, India Google Operations Center Full time ₹ 12,00,000 - ₹ 36,00,000 per year

    Join UsAt Google Operations Center we help Google users and customers solve problems and achieve their goals—all while enjoying a culture focused on improving continuously and being better together. We work hard, we play hard, and we want you to join usAs an Analytics & Insights Manager, you will drive measurement and analysis that support marketing...

  • Lead Cyber Security

    7 days ago


    Gurgaon, Haryana, India IndiGo Full time ₹ 12,00,000 - ₹ 36,00,000 per year

    Department: DigitalWork Mode: On-SiteLocation: GurugramJob Summary:Looking for Cybersecurity Operations Lead to oversee and manage enterprise-level security operations, threat management, and technology governance. The ideal candidate will have deep expertise in SSE (Security Service Edge), Threat Intelligence platforms, EDR solutions like CrowdStrike or...


  • Gurgaon, Haryana, India Airtel Full time ₹ 12,00,000 - ₹ 36,00,000 per year

    Lead - Inbound Contact Center Operations Brief about the Role : At Bharti Airtel we are building a digital organization with customer experience at heart of everything we do. We want to create experience benchmarks and be known world-wide for our experience standards . We are looking for an innovative, bright, and enthusiastic individual who will be...


  • Gurgaon, Haryana, India Amazon Full time

    AWS Infrastructure Services owns the design planning delivery and operation of all AWS global infrastructure In other words we re the people who keep the cloud running We support all AWS data centers and all of the servers storage networking power and cooling equipment that ensure our customers have continual access to the innovation they rely on ...


  • Gurgaon, Haryana, India Airtel Full time ₹ 9,00,000 - ₹ 12,00,000 per year

    Manager Security Ops Job Description: Airtel Business is looking for IT Security Analyst / L2 operation support for Security Services center Location: Gurgaon/ Manesar Job Summary:This is an opportunity for a highly motivated individual to join a high energy team of security administrators responsible for managing global security infrastructure. ...