49 Growel Softech Jobs
5-7 years
L2 Security Operations Center Analyst - Incident Management (5-7 yrs)
Growel Softech
posted 18d ago
Fixed timing
Key skills for the job
L2 SOC Analyst
Key Responsibilities :
- Conduct deep analysis of security incidents to identify the full kill chain and recommend remediation actions.
- Resolve technical escalations from the L1 team within SLA.
- Create and manage incident handling playbooks and process runbooks.
- Optimize SIEM alerts and suggest new use cases for security monitoring.
- Respond to client inquiries and provide solutions to security problems.
- Support L1 team during incidents and provide knowledge transfer, including advanced hunting techniques and guides.
- Ensure compliance with security procedures and maintain standards.
Knowledge & Experience :
- 5+ years of experience in Security Operations.
- Expertise in security event monitoring, alert triage, and incident investigation.
- Experience with SIEM (Sentinel, Splunk, QRadar) and EDR (CrowdStrike, Cybereason, Defender) platforms.
- Strong analytical skills and ability to mitigate threats swiftly.
- Knowledge of vulnerability scans, threat hunting, and endpoint threat detection.
Essential Skills :
- Proficient in SIEM and EDR platforms.
- Strong communication skills in English.
- Ability to work independently with minimal supervision.
- Willingness to work in a 24x7 SOC environment.
- This role requires someone ready to actively contribute to security operations and improve the overall cybersecurity posture of the organization.
Functional Areas: Other
Read full job descriptionPrepare for Security Operations Center Analyst roles with real interview advice
5-7 Yrs
6-8 Yrs