Gurgaon
• SOC Analyst – Level I (L1)
* Monitor security alerts and events in SIEM/XDR platforms (Elastic, Sentinel, Splunk, etc.).
* Perform initial triage, classify alerts, and escalate incidents as per playbooks.
* Document all activities and follow standard runbooks/SOPs.
* Assist in incident containment and validation.
* Maintain accurate shift handover reports and incident logs.
• SOC Analyst – Level II (L2)
* Perform deeper investigation of escalated alerts from L1.
* Analyze patterns, identify false positives, and fine-tune detection rules.
* Create and maintain incident response playbooks & runbooks.
* Work with SOAR tools to automate repetitive workflows.
* Collaborate with firewall/network teams for log correlation.
* Participate in threat hunting and vulnerability reviews.
• SOC Analyst – Level III (L3)
* Lead complex incident investigations and root cause analysis.
* Develop and optimize correlation rules, alert logic, and anomaly detections.
* Integrate and tune threat intelligence feeds (MISP, OTX, AbuseIPDB).
* Mentor L1/L2 analysts and improve SOC processes.
* Prepare SOC metrics, KPI dashboards, and compliance documentation.
Gurgaon
Please send your CV to apply for this job post