IN.JobDiagnosis logo

Job Title:

SOC L2/L3

Company: Tata Consultancy Services

Location: Pune, Maharashtra

Created: 2026-03-15

Job Type: Full Time

Job Description:

Greetings from TCS!!!Role: SOC L2/L3Experience: 6 to 15 yearsLocation: Hyderabad/Chennai/Bangalore***Drive date: 21-March-2026***Mode of interview: Walkin Job Description:Proactively search for threats that may not trigger alerts, utilizing threat intelligence and advanced analytical skills.Lead and coordinate responses to critical security incidents, including containment, eradication, and recovery.Create and refine detection rules and security use cases for SIEM and other security tools.Correlate data from threat intelligence feeds and other sources to identify emerging threats and vulnerabilities.Investigate complex security incidents to determine the root cause and prevent future occurrences.Maintain accurate and detailed records of incidents, investigations, and remediation steps.Work with other teams, such as engineering and IT, to improve security posture and implement necessary changes.Effectively communicate with stakeholders, including technical and non-technical personnel, about security incidents and status.Able to connect any type of logs and from any type of source to Sentinel Log Analytic workspace.Should have hands on experience in creating playbook, analytic rule, workbooks, notebooks for incident Threat hunting.Develop and automate incident response capabilityIf asked for, build custom detection rules on Defender based on ad hoc requests by clientGuide and train L1 and L2 analysts, sharing knowledge and expertise to improve the team's overall capabilities.Experience in Sentinel SIEM tool, Fine tuning of Rules. Knowledge of different Microsoft Defender products. Implementation and integration of defender for cloud services.Automation Rule creation along with creation of Playbooks, Workbooks.Leadership & Team management skills during their approved shifts. Experience in cloud computing and cloud security role.Experience in Azure security role.Experience in automation in SOC area.Minimum 5 years of experience in Microsoft Sentinel and Azure log analytics and developing Kusto Query Language Experience in SIEM and SOAR implementation. Should have experience in developing KQL queries for data normalization and parsing capability for Log Analytics data ingestion pipeline.Highly proficient in Microsoft Sentinel and Azure Log Analytics.Thanks & RegardsSindhuja PolisettyHR TAG – Cyber SecurityTata Consultancy Services

Apply Now

➤
Home | Contact Us | Privacy Policy | Terms & Conditions | Unsubscribe | Popular Job Searches
Use of our Website constitutes acceptance of our Terms & Conditions and Privacy Policies.
Copyright © 2005 to 2026 [VHMnetwork LLC] All rights reserved. Design, Develop and Maintained by NextGen TechEdge Solutions Pvt. Ltd.