Role : SOC Administrator
Experience : 6 to 10yrs
Location : Mumbai
Interview date : 26-Nov-25
Interview Mode : Virtual (Teams)
Required Technical Skill Set
Hands-on experience with Splunk Enterprise and / or Microsoft Sentinel
Strong understanding of SIEM architecture , log ingestion, and correlation rule setup
Experience in use case development , tuning, and false positive reduction
Familiarity with MITRE ATT&CK , Kill Chain , and SOC monitoring standards
Ability to perform health checks and troubleshoot SIEM components
Knowledge of security event investigation and escalation procedures
Experience in preparing runbooks , reports, and dashboards
Understanding of compliance frameworks (MAS, RBI, etc.)
Experience with integration of third-party tools into SIEM platforms
Exposure to cloud-native SIEM configurations (e.G., Azure Sentinel connectors)
Scripting knowledge (e.G., Python, PowerShell) for automation
Familiarity with incident response workflows
Knowledge of network protocols , firewall logs, and endpoint telemetry
Experience in audit support and regulatory reporting
Soc Admin • Republic Of India, IN