Project Role : Security Delivery Lead
Project Role Description : Leads the implementation and delivery of Security Services projects, leveraging our global delivery capability (method, tools, training, assets).
Must have skills : Security Information and Event Management (SIEM)
Good to have skills : NA
Minimum 12 year(s) of experience is required
Educational Qualification : 15 years full time education
Summary: As a Security Delivery Lead, you will be at the forefront of implementing and delivering Security Services projects. We are seeking a highly skilled and experienced Level 4 SOC Incident Responder to join our Security Operations Center (SOC) team. This senior-level position is critical in managing and responding to advanced cybersecurity threats, leading complex incident investigations, and developing detection and response strategies. The ideal candidate will possess deep technical expertise, strong analytical skills, and proven experience in managing end-to-end incident responses. Roles & Responsibilities: Incident Response & Management o Act as the primary lead on critical security incidents and complex investigations. o Triage, analyze, and respond to escalated security alerts and events from Level 1-3 SOC teams. o Conduct root cause analysis, forensic investigations, and impact assessments. o Coordinate with internal stakeholders and external partners during major incidents (e.g., breach response). o Develop and execute incident response plans (IRPs) and playbooks for various attack scenarios. Threat Hunting & Analysis o Proactively hunt for threats using SIEM, EDR, and threat intelligence data. o Identify and mitigate advanced persistent threats (APTs) and zero-day exploits. o Analyze malware, network traffic, endpoint artifacts, and log data to detect and contain threats. Tooling & Automation o Tune detection content and enhance alerting logic across SIEM/SOAR platforms. o Integrate and optimize use of tools such as Splunk, MxDR, Sentinel, CrowdStrike, Tines, XSOAR, etc. o Contribute to development and refinement of automated response workflows using SOAR tools. Mentoring & Leadership o Provide guidance and mentorship to L1-L3 analysts on investigation techniques and escalation paths. o Conduct knowledge-sharing sessions and tabletop exercises for IR preparedness. o Assist in training team members on evolving threats, tools, and methodologies. Reporting & Documentation o Prepare detailed incident reports, post-incident reviews (PIRs), and lessons learned. o Maintain up-to-date documentation of incident handling procedures and response plans. o Communicate technical findings clearly to both technical and non-technical stakeholders. Professional & Technical Skills: o 12+ years of experience in cybersecurity, with 8+ years in incident response or SOC operations. o Proven experience leading response for critical security incidents and breaches. o Expertise in analyzing and interpreting logs, packet captures, endpoint telemetry, and malware samples. o Strong experience with SIEM (e.g., Splunk, QRadar, Sentinel, MxDR) and EDR (e.g., CrowdStrike, Carbon Black) platforms. o Hands-on experience with SOAR platforms and scripting (Python, PowerShell, Bash). o Familiarity with MITRE ATT&CK, Cyber Kill Chain, and threat modeling frameworks. o Excellent understanding of Windows, Linux, network protocols, and cloud environments (AWS, Azure). o Strong written and verbal communication skills, especially in high-pressure situations. Preferred Certifications (one or more): o GIAC Certified Incident Handler (GCIH) o GIAC Certified Forensic Analyst (GCFA) o Certified Information Systems Security Professional (CISSP) o Certified Ethical Hacker (CEH) o MITRE ATT&CK Defender (MAD) o Azure/AWS Security Certifications Soft Skills: o Calm and decisive under pressure. o Highly analytical with strong problem-solving skills. o Ability to lead investigations with minimal supervision. o Excellent collaboration and communication abilities. Why Join Us: o Opportunity to work on cutting-edge security challenges and advanced threats. o Collaborate with a high-performing global security team. o Access to industry-leading tools and continuous learning resources. o Competitive compensation and growth opportunities. Additional Information: - The candidate should have minimum 12 years of experience in Security Information and Event Management (SIEM). - This position is based at our Pune office. - A 15 years full time education is required.
15 years full time education
About Accenture We work with one shared purpose: to deliver on the promise of technology and human ingenuity. Every day, more than 775,000 of us help our stakeholders continuously reinvent. Together, we drive positive change and deliver value to our clients, partners, shareholders, communities, and each other.We believe that delivering value requires innovation, and innovation thrives in an inclusive and diverse environment. We actively foster a workplace free from bias, where everyone feels a sense of belonging and is respected and empowered to do their best work.At Accenture, we see well-being holistically, supporting our people's physical, mental, and financial health. We also provide opportunities to keep skills relevant through certifications, learning, and diverse work experiences. We're proud to be consistently recognized as one of the World's Best Workplaces(TM).Join Accenture to work at the heart of change.
Visit us at
Equal Employment Opportunity Statement
We believe that no one should be discriminated against because of their differences. All employment decisions shall be made without regard to age, race, creed, color, religion, sex, national origin, ancestry, disability status, military veteran status, sexual orientation, gender identity or expression, genetic information, marital status, citizenship status or any other basis as protected by applicable law. Our rich diversity makes us more innovative, more competitive, and more creative, which helps us better serve our clients and our communities.
MNCJobsIndia.com will not be responsible for any payment made to a third-party. All Terms of Use are applicable.