By contacting us you agree with the storage and handling of your data by this website.
Key Responsibility Areas – Security Analyst - L3 – SOC
- Security Incident Leadership : Lead high-priority security investigations and incident response activities, ensuring accurate analysis, containment, remediation, and post-incident reporting.
- Operational Oversight : Oversee day-to-day SOC operations, including shift handovers, escalation management, and ensuring continuity across a 24 / 7 environment with global customers.
- Technical Expertise : Act as the escalation point for complex threats and security incidents requiring deep analysis of logs, packets, malware, and behavioral patterns using EDR, XDR, SIEM, and forensic tools.
- Threat Detection and Hunting : Conduct proactive threat hunting using various data sources and tools. Create and optimize detection use-cases, correlation rules, and playbooks to enhance threat visibility and reduce dwell time.
- Process & Playbook Management : Develop, refine, and enforce standard operating procedures (SOPs), playbooks, and incident response workflows to drive consistent and measurable outcomes.
- Customer Engagement : Interface with global stakeholders (especially US / Canada clients), providing clear incident briefings, RCA reports, and advisory support.
- Collaboration and Mentorship : Mentor L1 and L2 analysts, conduct training sessions, and support skill development across shifts.
- Continuous Improvement : Participate in tuning detection content, improving tool configurations, and supporting red / blue / purple team exercises to elevate SOC maturity.
- Documentation and Reporting : Ensure high-quality documentation of incidents, processes, and technical findings. Contribute to executive and operational reporting.
#J-18808-Ljbffr