Security Operations Center Analyst (SOC L3)

7 - 10 years

0 Lacs

Posted:5 days ago| Platform: Linkedin logo

Apply

Work Mode

On-site

Job Type

Full Time

Job Description

Mumbai

Immediate - 20 days

Strong L3 SOC Analysts

2–3

7 to 10 years


Core Skills:

Expert in Splunk Enterprise Security and IBM QRadar – detection, correlation, administration

Proven experience in advanced threat hunting aligned to MITRE ATT&CK

Ability to manage detection use case lifecycle, RCA, compliance, and audit readiness

Experience leading L1 and L2 teams, conducting RCA, and reporting to leadership

Exposure to SOAR playbooks, automation, and red/purple team collaboration


Certifications (Preferred):

CEH – Certified Ethical Hacker

Splunk Enterprise Security Admin / Architect

IBM QRadar Deployment Professional / Admin

GCIA / GCIH / GCFA / OSCP

MITRE ATT&CK Defender (MAD)

OEM Product Certifications

ISO 27001 Lead Implementer / CISA (preferred for governance alignment)


Additional Notes:


All candidates should have strong investigative mindset, documentation habits, and ability to operate independently during incident escalations.

Exposure to SOC compliance frameworks (ISO 27001, CERT-In, IRDAI, NCIIPC) is an added plus.


Interested candidates can share updated resume on anamika@enroutecorp.in

Mock Interview

Practice Video Interview with JobPe AI

Start Job-Specific Interview
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

coding practice

Enhance Your Skills

Practice coding challenges to boost your skills

Start Practicing Now

RecommendedJobs for You