IN.JobDiagnosis logo

Job Title:

Security Operations Center Analyst L3 || 7 Year+ || Mumbai || Only Immediate Joiner

Company: Innova ESI

Location: Mumbai, Maharashtra

Created: 2026-01-06

Job Type: Full Time

Job Description:

Job Title: Senior SOC Analyst (L3)Location: Mumbai, IndiaExperience Required: 7+ YearsEmployment Type: Full-TimeJob Summary:Key Responsibilities:Perform real-time security monitoring, analysis, and incident response for enterprise systems, networks, and applications.Investigate security alerts and correlate events using SIEM tools (e.g., Splunk, QRadar, ArcSight, Azure Sentinel).Conduct threat hunting, log analysis, and root cause investigations for potential or actual incidents.Manage the incident response lifecycle — triage, containment, eradication, recovery, and post-incident review.Escalate incidents to higher levels (L3 or CSIRT) as per defined playbooks.Develop and tune correlation rules, dashboards, and detection use cases.Collaborate with IT, network, and application teams to mitigate vulnerabilities.Generate incident reports, maintain SOC documentation, and contribute to process improvements.Participate in security assessments, vulnerability management, and threat intelligence integration.Mentor junior analysts (L1/L2) and help strengthen SOC operational maturity.Required Skills and Qualifications:Bachelor’s degree in Computer Science, Information Security, or related discipline.7+ years of total IT/security experience, with minimum 4+ years in SOC operations.Proficient in SIEM platforms such as Splunk, IBM QRadar, ArcSight, or Azure Sentinel.Strong understanding of network protocols, firewalls, proxies, endpoint security, and malware analysis.Expertise in incident response, log analysis, and threat intelligence correlation.Familiarity with MITRE ATT&CK framework, NIST, and ISO 27001 standards.Experience with EDR tools (CrowdStrike, Carbon Black, SentinelOne, etc.).Knowledge of Windows, Linux, and cloud security (AWS, Azure) environments.Excellent analytical thinking, documentation, and communication skills.Preferred / Good to Have:Certifications: CEH, CHFI, CompTIA Security+, GCIA, GCIH, or Splunk Certified Analyst.Experience in security automation (SOAR) and playbook development.Exposure to threat hunting, forensic analysis, and purple team activities.

Apply Now

➤
Home | Contact Us | Privacy Policy | Terms & Conditions | Unsubscribe | Popular Job Searches
Use of our Website constitutes acceptance of our Terms & Conditions and Privacy Policies.
Copyright © 2005 to 2026 [VHMnetwork LLC] All rights reserved. Design, Develop and Maintained by NextGen TechEdge Solutions Pvt. Ltd.