Talent.com
No longer accepting applications
Security Operations Center Analyst || 7 Year+ || Mumbai || Only Immediate Joiner

Security Operations Center Analyst || 7 Year+ || Mumbai || Only Immediate Joiner

Innova ESImumbai, maharashtra, in
1 day ago
Job description

Job Title : Senior SOC Analyst (L3)

Location : Mumbai, India

Experience Required : 7+ Years

Employment Type : Full-Time

Job Summary :

NTT DATA is seeking an experienced Senior SOC Analyst to join our Security Operations Center (SOC) in Mumbai. The candidate will play a key role in detecting, analyzing, responding to, and preventing cybersecurity incidents across enterprise environments. The ideal professional will have strong technical, analytical, and communication skills with a deep understanding of threat landscapes, SIEM technologies, and incident response processes.

Key Responsibilities :

  • Perform real-time security monitoring, analysis, and incident response for enterprise systems, networks, and applications.
  • Investigate security alerts and correlate events using SIEM tools (e.g., Splunk, QRadar, ArcSight, Azure Sentinel).
  • Conduct threat hunting, log analysis, and root cause investigations for potential or actual incidents.
  • Manage the incident response lifecycle — triage, containment, eradication, recovery, and post-incident review.
  • Escalate incidents to higher levels (L3 or CSIRT) as per defined playbooks.
  • Develop and tune correlation rules, dashboards, and detection use cases .
  • Collaborate with IT, network, and application teams to mitigate vulnerabilities.
  • Generate incident reports , maintain SOC documentation, and contribute to process improvements.
  • Participate in security assessments, vulnerability management, and threat intelligence integration .
  • Mentor junior analysts (L1 / L2) and help strengthen SOC operational maturity.

Required Skills and Qualifications :

  • Bachelor’s degree in Computer Science, Information Security, or related discipline.
  • 7+ years of total IT / security experience, with minimum 4+ years in SOC operations .
  • Proficient in SIEM platforms such as Splunk, IBM QRadar, ArcSight, or Azure Sentinel.
  • Strong understanding of network protocols, firewalls, proxies, endpoint security, and malware analysis.
  • Expertise in incident response, log analysis, and threat intelligence correlation.
  • Familiarity with MITRE ATT&CK framework, NIST, and ISO 27001 standards.
  • Experience with EDR tools (CrowdStrike, Carbon Black, SentinelOne, etc.).
  • Knowledge of Windows, Linux, and cloud security (AWS, Azure) environments.
  • Excellent analytical thinking, documentation, and communication skills.
  • Preferred / Good to Have :

  • Certifications : CEH, CHFI, CompTIA Security+, GCIA, GCIH, or Splunk Certified Analyst.
  • Experience in security automation (SOAR) and playbook development .
  • Exposure to threat hunting, forensic analysis, and purple team activities.
  • Create a job alert for this search

    Security Analyst • mumbai, maharashtra, in