Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations.
Must have skills :
Security Information and Event Management (SIEM)
Good to have skills :
NA
Minimum
5
year(s) of experience is required
Educational Qualification :
15 years full time education
Summary: As an L3 Cyber Security Analyst, you will act as the highest-level escalation point in the SOC for investigating and responding to complex security incidents. You will lead threat hunting initiatives, develop detection techniques, perform deep-dive forensic analysis, and work closely with engineering and threat intelligence teams to continuously improve the organization's security posture. This role requires strong technical skills, a strategic mindset, and the ability to lead and mentor junior analysts. Roles & Responsibilities: - Act as a subject matter expert (SME) for advanced threat detection, investigation, and response. - Triage and lead investigations of escalated security incidents from L1 and L2 analysts. - Create and fine-tune advanced detection rules, use cases and playbooks in SIEM (CrowdStrike Next-Gen), SOAR (CrowdStrike Falcon Fusion), EDR, and other tools. - Collaborate with Threat Intelligence teams to incorporate emerging threats into detection strategy. - Onboard logs into the SIEM (CrowdStrike Next-Gen SIEM) and SOAR (CrowdStrike Falcon Fusion) using data connectors, Falcon Log Collector, and other supported ingestion methods. - Validate log ingestion, ensure proper parsing, and verify that logs align with established schemas (e.g., CEF, LEEF, Syslog, JSON). - Customize and maintain parsers, log collectors, and transformation rules. - Provide incident response support, including containment, eradication, and recovery activities. - Write detailed incident reports and post-mortem documentation for key stakeholders. - Lead and mentor L1 and L2 analysts; provide training and knowledge transfer. - Ensure compliance with internal security policies and external regulatory requirements (e.g., GDPR, ISO 27001, NIST). Professional & Technical Skills: - Must To Have Skills: Proficiency in Security Information and Event Management (SIEM). - Strong understanding of cloud security principles and practices. - Experience with security frameworks such as NIST, ISO 27001, or CIS. - Familiarity with incident response and threat detection methodologies. - Knowledge of regulatory requirements related to cloud security. - Relevant certifications (e.g., CISSP, CISM, GCIA, GCIH, CEH, CompTIA CySA+). - Deep understanding of cyber threat tactics, techniques, and procedures (TTPs). - Hands-on experience with SIEM, SOAR, and EDR/XDR platforms. - Knowledge of forensic tools and methodologies (e.g., FTK, EnCase, Volatility). Additional Information: - The candidate should have minimum 7+ years of experience in cybersecurity, with at least 5 years in an L2/L3 SOC role. - Bachelor's degree in Cybersecurity, Information Security, Computer Science, or a related field; equivalent work experience considered. - This position is based at our Bengaluru office. - A 15 years full time education is required. - Strong analytical, decision-making, and problem-solving abilities. - Strong written and verbal communication skills. - Ability to work under pressure in a fast-paced environment. - Understanding of networking, cloud security, malware analysis, and threat intelligence.
15 years full time education
Beware of fraud agents! do not pay money to get a job
MNCJobsIndia.com will not be responsible for any payment made to a third-party. All Terms of Use are applicable.