Job Title:
L2 SOC Security Analyst (SIEM, EDR, Incident Analysis)
Company: Cloud4C Services
Location: Hyderabad, Telangana
Created: 2026-05-02
Job Type: Full Time
Job Description:
Number of Positions: 2Location: Hyderabad (Work from Office – Mandatory)Experience: 3–5 YearsCompensation: ₹10 – ₹12 LPASummary24/7 Managed SOC, the L2 Analyst is responsible for real-time threat monitoring, alert analysis, incident triage, and response across hybrid cloud and on-prem environments.Skills & Responsibilities 3–5 years in SOC / Incident ResponsePerform real-time monitoring of security events via SIEM, EDR, and threat intelligence platformsAnalyze and validate alerts generated from correlation rules, anomaly detection, and behavioral analytics Conduct incident triage, investigation, and escalation to L3 teamsExecute threat response actions (containment, endpoint isolation, blocking malicious activity) Perform log analysis across cloud, network, endpoint, and application layersSupport root cause analysis (RCA) and incident reportingReduce false positives through tuning and correlation improvementsEnsure adherence to SLA-driven response timelines (MTTD / MTTR reduction)Required Hands-on SIEM (Microsoft Sentinel, QRadar, Splunk)EDR/XDR tools (Microsoft Defender, CrowdStrike, etc.)Knowledge of MITRE ATT&CK, threat lifecycle, IOC analysisUnderstanding of cloud security monitoring (Azure/AWS/GCP)Experience in SOC environments with alert management & log correlation