hireejobs
Hyderabad Jobs
Banglore Jobs
Chennai Jobs
Delhi Jobs
Ahmedabad Jobs
Mumbai Jobs
Pune Jobs
Vijayawada Jobs
Gurgaon Jobs
Noida Jobs
Oil & Gas Jobs
Banking Jobs
Construction Jobs
Top Management Jobs
IT - Software Jobs
Medical Healthcare Jobs
Purchase / Logistics Jobs
Sales
Ajax Jobs
Designing Jobs
ASP .NET Jobs
Java Jobs
MySQL Jobs
Sap hr Jobs
Software Testing Jobs
Html Jobs
IT Jobs
Logistics Jobs
Customer Service Jobs
Airport Jobs
Banking Jobs
Driver Jobs
Part Time Jobs
Civil Engineering Jobs
Accountant Jobs
Safety Officer Jobs
Nursing Jobs
Civil Engineering Jobs
Hospitality Jobs
Part Time Jobs
Security Jobs
Finance Jobs
Marketing Jobs
Shipping Jobs
Real Estate Jobs
Telecom Jobs

SOC Level 3 Analyst

Fresher   All India, Gurugram   31 Mar, 2026
Job LocationAll India, Gurugram
EducationNot Mentioned
SalaryNot Disclosed
IndustryIT Services & Consulting
Functional AreaNot Mentioned
EmploymentTypeFull-time

Job Description

    As a Senior SOC analyst, your role involves advanced investigations, cross-tool correlation, root cause analysis, and complex containment/eradication within a Microsoft-centric environment. Your strong, recent, hands-on experience with tools like Microsoft Sentinel, Defender XDR, and Entra ID in production environments is mandatory. You will be working in both IT and OT environments. While OT related experience is a plus, it is not required; however, willingness to learn is essential.Your key outcomes and KPIs include reducing Mean Time to Acknowledge (MTTA) and Mean Time to Resolve (MTTR) through tuned analytics and automation, increasing detection fidelity, suppressing false positives, and maintaining audit-ready documentation and consistent ServiceNow records.Your core responsibilities will involve owning alert management and incident response, proactively monitoring security events, driving advanced investigations, leading containment and eradication efforts, authoring complex KQL queries, tuning analytic rules, maintaining automation, overseeing ServiceNow lifecycles for complex cases, mentoring L1 analysts, leading User and Entity Behavior Analytics (UEBA) assessments, and contributing to tuning SOC processes.In terms of qualification requirements, you should have at least 5 years of experience in IT Security operations and/or planning. Your technical expertise should cover networks, Windows/Linux operations, infrastructure, cloud concepts, and Microsoft Security & Identity tools like Microsoft Sentinel, Defender XDR, and Entra ID. Additionally, you should have experience with complementary platforms like Zscaler, Trend Micro, and ServiceNow ITSM, as well as knowledge of threat intelligence and frameworks such as MITRE ATT&CK.Soft skills required for this role include fluent business English, effective communication, collaboration abilities, autonomy in work, self-directed learning capacity, advanced Excel knowledge, presentation skills, basic knowledge of ITIL and NIST CSF Frameworks, experience in project management, and familiarity with Power BI.Your hands-on experience with the Microsoft security stack and integrated tooling is crucial for this role. While relevant education or industry certifications are beneficial, competency and proven results are given priority. As a Senior SOC analyst, your role involves advanced investigations, cross-tool correlation, root cause analysis, and complex containment/eradication within a Microsoft-centric environment. Your strong, recent, hands-on experience with tools like Microsoft Sentinel, Defender XDR, and Entra ID in production environments is mandatory. You will be working in both IT and OT environments. While OT related experience is a plus, it is not required; however, willingness to learn is essential.Your key outcomes and KPIs include reducing Mean Time to Acknowledge (MTTA) and Mean Time to Resolve (MTTR) through tuned analytics and automation, increasing detection fidelity, suppressing false positives, and maintaining audit-ready documentation and consistent ServiceNow records.Your core responsibilities will involve owning alert management and incident response, proactively monitoring security events, driving advanced investigations, leading containment and eradication efforts, authoring complex KQL queries, tuning analytic rules, maintaining automation, overseeing ServiceNow lifecycles for complex cases, mentoring L1 analysts, leading User and Entity Behavior Analytics (UEBA) assessments, and contributing to tuning SOC processes.In terms of qualification requirements, you should have at least 5 years of experience in IT Security operations and/or planning. Your technical expertise should cover networks, Windows/Linux operations, infrastructure, cloud concepts, and Microsoft Security & Identity tools like Microsoft Sentinel, Defender XDR, and Entra ID. Additionally, you should have experience with complementary platforms like Zscaler, Trend Micro, and ServiceNow ITSM, as well as knowledge of threat intelligence and frameworks such as MITRE ATT&CK.Soft skills required for this role include fluent business English, effective communication, collaboration abilities, autonomy in work, self-directed learning capacity, advanced Excel knowledge, presentation skills, basic knowledge of ITIL and NIST CSF Frameworks, experience in project management, and familiarity with Power BI.Your hands-on experience with the Microsoft security stack and integrated tooling is crucial for this role. While relevant education or industry certifications are beneficial, competency and proven results are given priority.

Keyskills :
ServiceNowThreat IntelligenceInfrastructureSoft SkillsMicrosoft SentinelDefender XDREntra IDZscalerTrend MicroKQLAzure Logic AppsUEBAMITRE ATTCKNetwork ProtocolsWindowsLinux OperationsCloud ConceptsMicrosoft SecurityIdentity

SOC Level 3 Analyst Related Jobs

© 2019 Hireejobs All Rights Reserved