Position Summary :
We are hiring a Level 2 SOC Analyst to strengthen our 24x7 Security Operations Center. The ideal candidate will have hands-on experience with FortiSIEM, FortiSOAR, and other leading SIEM and EDR platforms. This role demands strong analytical skills, incident response capabilities, and the ability to work in a fast-paced, multi-vendor environment.
Key Responsibilities :
- Monitor, investigate, and respond to security alerts from SIEM solutions like FortiSIEM, Seceon aiSIEM, Azure Sentinel.
- Execute and optimize playbooks in SOAR platforms for automated incident response.
- Perform threat hunting and forensic analysis using SIEM / EDR tools.
- Classify and prioritize incidents, escalate as needed, and coordinate with L1 / L3 teams for resolution.
- Integrate new log sources and maintain parser health across SIEM platforms.
- Generate daily, weekly, and monthly reports on incident trends, vulnerabilities, and SOC Operations.
Required Skills :
3-5 years of experience in a SOC environment.Strong expertise in FortiSIEM and FortiSOAR.Strong Knowledge in MITRE Frameworks (ATT&CK, D3FEND)Well versed with the documentation skills.Proficiency in other SIEM tools is an added advantage "Seceon aiSIEM, Azure Sentinel, IBM QRadar etc.,".Hands-on experience with EDR platforms in any : CrowdStrike, SentinelOne, Trellix, Sophos, Trend Micro.Familiarity with scripting (Python, PowerShell) and query languages (KQL, AQL, SQL).Experience with ticketing tools like ServiceNow, Zoho Helpdesk.(ref : hirist.tech)