SOC Engineer - L3
Location : Hyderabad
Mode : Hybrid
Role Summary
- Act as the senior-level analyst responsible for handling complex security incidents and advanced threats.
- Lead investigations, triage escalations from L1 / L2 analysts, and coordinate response actions.
- Serve as the technical expert for SOC operations, threat detection, and remediation. Key Responsibilities.
- Lead investigation and response for high-severity incidents (P1 / P2).
- Perform root cause analysis and advanced threat hunting.
- Guide L1 / L2 analysts on incident investigation procedures.
- Coordinate with IT, network, application, and security teams for containment and remediation.
- Develop and maintain incident response playbooks and standard operating procedures (SOPs).
- Analyze alerts from SIEM, SOAR, EDR, NDR, WAF, and cloud security tools.
- Identify patterns, anomalies, and emerging threats using threat intelligence.
- Conduct malware analysis, phishing investigation, and forensic analysis when required.
- Integrate threat intelligence into SOC workflows and monitoring systems.
- Tune SIEM, SOAR, and detection rules for accuracy and efficiency.
- Develop automation scripts and workflows to reduce manual SOC tasks.
- Mentor and train L1 / L2 analysts on advanced detection techniques.
- Participate in SOC process improvement initiatives.
- Provide clear and detailed incident reports to SOC Manager and leadership.
- Communicate threat impact and resolution status to internal stakeholders.
- Support audit, compliance, and regulatory reporting requirements.
- Collaborate with Red Team, Vulnerability Management, and CTI teams.
Qualifications & Skills Education & Certification
Bachelors or Masters in Computer Science, Information Security, or related field.Relevant certifications preferred : CISSP, GCIA, GCIH, CEH, OSCP, Splunk / QRadar / Sentinel certs.Technical Skills Advanced knowledge of :
SIEM / SOAR platforms (Splunk, QRadar, Sentinel, etc.)Endpoint detection & response (CrowdStrike, Trellix, Defender, etc.)Network, cloud, and web application securityMalware analysis, threat hunting, and forensic investigationsExperience with scripting / automation (Python, PowerShell, Bash).Familiarity with MITRE ATT&CK framework and TTP analysis.Soft Skills :
Strong analytical and problem-solving abilities.Ability to work under pressure during critical incidents.Excellent communication and documentation skills.Team mentoring and knowledge-sharing aptitude.Experience :
8-10 years in cybersecurity operations or SOC environment.At least 2-3 years in advanced incident response or L3 SOC roles.Experience in enterprise SOC or MSSP SOC preferred.