SOC Engineer - L3
Location : Hyderabad
Mode : Hybrid
Role Summary
Act as the senior-level analyst responsible for handling complex security incidents and advanced threats.
Lead investigations, triage escalations from L1 / L2 analysts, and coordinate response actions.
Serve as the technical expert for SOC operations, threat detection, and remediation. Key Responsibilities.
Lead investigation and response for high-severity incidents (P1 / P2).
Perform root cause analysis and advanced threat hunting.
Guide L1 / L2 analysts on incident investigation procedures.
Coordinate with IT, network, application, and security teams for containment and remediation.
Develop and maintain incident response playbooks and standard operating procedures (SOPs).
Analyze alerts from SIEM, SOAR, EDR, NDR, WAF, and cloud security tools.
Identify patterns, anomalies, and emerging threats using threat intelligence.
Conduct malware analysis, phishing investigation, and forensic analysis when required.
Integrate threat intelligence into SOC workflows and monitoring systems.
Tune SIEM, SOAR, and detection rules for accuracy and efficiency.
Develop automation scripts and workflows to reduce manual SOC tasks.
Mentor and train L1 / L2 analysts on advanced detection techniques.
Participate in SOC process improvement initiatives.
Provide clear and detailed incident reports to SOC Manager and leadership.
Communicate threat impact and resolution status to internal stakeholders.
Support audit, compliance, and regulatory reporting requirements.
Collaborate with Red Team, Vulnerability Management, and CTI teams.
Qualifications & Skills Education & Certification
Bachelors or Masters in Computer Science, Information Security, or related field.
Relevant certifications preferred : CISSP, GCIA, GCIH, CEH, OSCP, Splunk / QRadar / Sentinel certs.
Technical Skills Advanced knowledge of :
SIEM / SOAR platforms (Splunk, QRadar, Sentinel, etc.)
Endpoint detection & response (CrowdStrike, Trellix, Defender, etc.)
Network, cloud, and web application security
Malware analysis, threat hunting, and forensic investigations
Experience with scripting / automation (Python, PowerShell, Bash).
Familiarity with MITRE ATT&CK framework and TTP analysis.
Soft Skills :
Strong analytical and problem-solving abilities.
Ability to work under pressure during critical incidents.
Excellent communication and documentation skills.
Team mentoring and knowledge-sharing aptitude.
Experience :
8-10 years in cybersecurity operations or SOC environment.
At least 2-3 years in advanced incident response or L3 SOC roles.
Experience in enterprise SOC or MSSP SOC preferred.
Soc Engineer • Hyderabad, India