Job Title:
Senior Security Analyst
Company: ColorTokens Inc.
Location: Bangalore, Karnataka
Created: 2026-02-25
Job Type: Full Time
Job Description:
Job Title: Senior Security Analyst - L2Location: Bangalore (on site)Experience Level: 6 to 10 yearsAbout ColorTokensAt ColorTokens, we empower businesses to stay operational and resilient in an increasingly complex cybersecurity landscape. Breaches happen—but with our cutting-edge ColorTokens Xshield™ platform, companies can minimize the impact of breaches by preventing the lateral spread of ransomware and advanced malware. We enable organizations to continue operating while breaches are contained, ensuring critical assets remain protected.Our innovative platform provides unparalleled visibility into traffic patterns between workloads, OT/IoT/IoMT devices, and users, allowing businesses to enforce granular micro-perimeters, swiftly isolate key assets, and respond to breaches with agility. Recognized as a Leader in the Forrester Wave™: Microsegmentation Solutions (Q3 2024), ColorTokens safeguards global enterprises and delivers significant savings by preventing costly disruptions.Join us in transforming cybersecurity. Learn more at .Our cultureWe foster an environment that values customer focus, innovation, collaboration, mutual respect, and informed decision-making. We believe in alignment and empowerment so you can own and drive initiatives autonomously.Self-starters and highly motivated individuals will enjoy the rewarding experience of solving complex challenges that protect some of the world’s impactful organizations - be it a children’s hospital, or a city, or the defense department of an entire country.Job Description:ColorTokens is seeking a highly experienced and proactive Senior Security Analyst (L3) to lead complex threat investigations and incident response within our Managed Security Operations Center (SOC). This role is critical in identifying advanced threats, guiding security operations, developing detection strategies, and mentoring Tier 1 and Tier 2 analysts. The ideal candidate possesses deep technical expertise in cybersecurity, excellent analytical skills, and a strong understanding of modern attack techniques across IT and OT environments.Key Responsibilities:Lead investigation and response for high-severity security incidents across customer environmentsPerform deep-dive forensics on endpoints, network traffic, logs, and cloud environmentsCorrelate and enrich data from multiple sources (EDR, SIEM, NDR, threat intel, OT sensors)Serve as an escalation point for complex alerts and incidents from L1/L2 teamsConduct proactive threat hunting based on TTPs (MITRE ATT&CK) and IOC analysisDevelop detection use cases, custom SIEM rules, and SOAR automation workflowsParticipate in red/blue/purple team exercises and incident simulationsGuide playbook development and tuning of triage/response workflowsDeliver incident briefings and root cause analysis (RCA) reports to internal and external stakeholdersCollaborate with threat intelligence, engineering, and customer success teamsMentor junior analysts and contribute to team knowledge-sharing initiativesRequired Skills & Experience:6–10 years of experience in a SOC, threat detection, incident response, or cyber forensics roleStrong knowledge of threat actor tactics, techniques, and procedures (TTPs)Proficient in interpreting logs across various platforms: SIEMs, EDRs, firewalls, cloud environmentsHands-on experience with tools such as:SIEM: Splunk, Sentinel, QRadarEDR/XDR: CrowdStrike, Defender for Endpoint, SentinelOneNDR: Vectra, Darktrace, ExtraHopSOAR: XSOAR, Splunk SOAR, TinesExperience with scripting and automation (Python, KQL, Bash, PowerShell)In-depth knowledge of Windows, Linux, and network protocolsExposure to cloud security (Azure, AWS) and hybrid infrastructuresFamiliarity with OT/ICS environments (Nozomi, Claroty, etc.) is a strong plusQualifications:Bachelor’s degree in Cybersecurity, Computer Science, or related field (or equivalent experience)One or more advanced certifications preferred:GIAC (GCIA, GCIH, GCFA, GNFA)OSCP / OSEPSC-200 / AZ-500 / CISSPGICSP (for OT/ICS experience)Preferred Skills:Strong problem-solving skills under pressureExcellent written and verbal communication (for RCA reports, executive briefings)Ability to lead customer-facing incident response calls and postmortemsPassion for staying current with threat landscape and evolving technologiesTeam player with mentoring mindsetWhy Join Us?Work on a cutting-edge cybersecurity product in a fast-paced startup environment.Collaborate with a world-class team of engineers and security experts.Opportunity to learn, grow, and make a real impact from day one.