SOC Analyst L2
Job Title : Level 2 Senior Security Operations Center (SOC) Analyst
Job Location :
- WORK FROM NOIDA OFFICE, PLEASE DON'T APPLY IF YOU ARE LOOKING FOR HYBRID OR WORK FROM HOME
- Short notice period or immediate joiners are preferred.
Job Overview :
As a Senior SOC Engineer, you will play a pivotal role in enhancing the organization's cybersecurity capabilities by leveraging advanced tools such as Microsoft Sentinel and KQL (Kusto Query Language). Reporting to the SOC Team Lead, you will handle complex security incidents, develop detection mechanisms, and provide mentorship to junior SOC analysts. This role requires deep technical expertise, proactive threat detection skills, and the ability to collaborate effectively with stakeholders to strengthen the organization's overall security posture.
Key Responsibilities :
1. Security Operations :
Serve as a technical escalation point for SOC analysts in resolving complex security incidents.Monitor, analyze, and optimize the performance of Microsoft Sentinel and related security tools.Conduct advanced threat hunting activities to proactively identify and mitigate potential threats.Lead detailed root cause analyses for incidents and recommend remediation strategies.2. System and Tool Optimization :
Assist in development and refine detection rules, alerts, and dashboards in Microsoft Sentinel to enhance SOC efficiency.Collaborate with IT and security teams to integrate new tools and optimize existing SOC workflows.Evaluate and implement emerging technologies to improve threat detection and response capabilities.3. Incident Response :
Coordinate and manage incident response efforts for critical security events.Ensure timely containment, eradication, and recovery during security incidents.Document and share lessons learned from security incidents to drive continuous improvement.4. Mentorship and Training :
Provide guidance and technical support to junior SOC analysts, fostering their growth and development.Conduct training sessions to enhance the team's proficiency in threat detection and analysis.5. Threat Intelligence and Reporting :
Integrate threat intelligence into SOC processes to bolster proactive defense measures.Prepare detailed reports on incident trends, security metrics, and recommendations for stakeholders.Required Skills & Qualifications :
1. Education :
Bachelor’s degree in Computer Science, Information Security, or a related field (or equivalent experience).2. Certifications :
Required : Microsoft Certified : Security Operations Analyst Associate.Preferred : CompTIA CySA+, CISSP, or other relevant certifications.3. Technical Skills :
Extensive experience with Microsoft Sentinel, including expertise in KQL (Kusto Query Language).Strong knowledge of incident response methodologies, threat hunting, and root cause analysis.Proficiency in SIEM tools, cybersecurity principles, and common attack vectors.Familiarity with Azure Active Directory, security configurations, and compliance standards.4. Soft Skills :
Strong analytical and critical-thinking skills.Ability to communicate effectively with both technical and non-technical audiences.Team-oriented with a focus on mentorship and collaboration.Composure and professionalism in high-pressure situations.Proven English communication skills supported by professional certifications such as IELTS, TOEIC, or BEC.Ability to write technical and executive-level documentation in English, including reports, presentations, and incident summaries.Experience :
3–5 years of experience in a SOC or similar cybersecurity role.Demonstrated expertise in managing complex security incidents and optimizing SOC tools.