Job Title:
SOC L2/L3
Company: Tata Consultancy Services
Location: Pune, Maharashtra
Created: 2026-03-15
Job Type: Full Time
Job Description:
Greetings from TCS!!!Role: SOC L2/L3Experience: 6 to 15 yearsLocation: Hyderabad/Chennai/Bangalore***Drive date: 21-March-2026***Mode of interview: Walkin Job Description:Proactively search for threats that may not trigger alerts, utilizing threat intelligence and advanced analytical skills.Lead and coordinate responses to critical security incidents, including containment, eradication, and recovery.Create and refine detection rules and security use cases for SIEM and other security tools.Correlate data from threat intelligence feeds and other sources to identify emerging threats and vulnerabilities.Investigate complex security incidents to determine the root cause and prevent future occurrences.Maintain accurate and detailed records of incidents, investigations, and remediation steps.Work with other teams, such as engineering and IT, to improve security posture and implement necessary changes.Effectively communicate with stakeholders, including technical and non-technical personnel, about security incidents and status.Able to connect any type of logs and from any type of source to Sentinel Log Analytic workspace.Should have hands on experience in creating playbook, analytic rule, workbooks, notebooks for incident Threat hunting.Develop and automate incident response capabilityIf asked for, build custom detection rules on Defender based on ad hoc requests by clientGuide and train L1 and L2 analysts, sharing knowledge and expertise to improve the team's overall capabilities.Experience in Sentinel SIEM tool, Fine tuning of Rules. Knowledge of different Microsoft Defender products. Implementation and integration of defender for cloud services.Automation Rule creation along with creation of Playbooks, Workbooks.Leadership & Team management skills during their approved shifts. Experience in cloud computing and cloud security role.Experience in Azure security role.Experience in automation in SOC area.Minimum 5 years of experience in Microsoft Sentinel and Azure log analytics and developing Kusto Query Language Experience in SIEM and SOAR implementation. Should have experience in developing KQL queries for data normalization and parsing capability for Log Analytics data ingestion pipeline.Highly proficient in Microsoft Sentinel and Azure Log Analytics.Thanks & RegardsSindhuja PolisettyHR TAG – Cyber SecurityTata Consultancy Services