Sr Analyst - SOC IR

  • bangalore
  • Experience - Min of 6 - 10+yrs of relevant experience in SOC / IR

Skills Required


  • Should have worked in SOC L3 and L2 teams in prior experience
  • Must have handled various SIEM and SOAR Tools.
  • Analyzing logs to identify patterns, trends, or other meaningful insights in order to make recommendations for improvement
  • Must have experience handling SNOW ticketing tools
  • Should have excellent verbal, written, problem solving, Analytical and interpersonal skill
  • Experience managing the work delivered by Service providers / MSSP
  • Prior experience in SOC Red team will be a added advantage.


  • Triage Specialist: Tier 1 analysts are mainly responsible for collecting raw data as well as reviewing alarms and alerts. They need to confirm, determine or adjust the criticality of alerts and enrich them with relevant data. For every alert, the triage specialist has to identify whether it’s justified or a false positive, as alert fatigue is a real issue. An additional responsibility at this level is identifying other high-risk events and potential incidents. All these need to be prioritized according to their criticality. If problems occurring cannot be solved at this level, they have to be escalated to tier 2 analysts. Furthermore, triage specialists are often managing and configuring the monitoring tools.


  • Threat Hunter: Tier 3 analysts are the most experienced workforce in a SOC. They handle major incidents escalated to them by the incident responders. They also perform or at least supervise vulnerability assessments and penetration tests to identify possible attack vectors. Their most important responsibility is to proactively identify possible threats, security gaps and vulnerabilities that might be unknown. They should also recommend ways to optimize the deployed security monitoring tools as they gain reasonable knowledge about a possible threat to the systems. Additionally, any critical security alerts, threat intelligence, and other security data provided by tier 1 and tier 2 analysts need to be reviewed at this tier.
  • Malware Analysts or Reverse Engineers
  • Forensics Specialists or Analysts investigate and research cyber events or crimes related to information technology (IT) systems, networks and digital evidence.
  • Should have experience in handling confidential investigations across various levels.
  • Ability to develop and prepare playbooks.