Q3 technologies
Q3 technologies16d ago
Naukri

Analyst III

Jaipur
Senior Level

Auto Apply to 50+ AI Matched Analyst III Jobs

Use Auto Apply Agents to Bulk Apply jobs with ATS Optimised Resumes, find verified Insider Connections for jobs at Q3 technologies

Full Job Description

Job Overview

Q3 Technologies is seeking an experienced Analyst III for its Security Operations Center (SOC) in Jaipur. This role involves leading advanced monitoring, complex investigations, and providing day-to-day oversight to SOC analysts to ensure high-quality security operations for ATS and client environments.

Primary Responsibilities

  • Serve as the primary escalation point for intricate security alerts and incidents.
  • Lead incident response efforts, including containment and remediation strategies.
  • Conduct proactive threat hunting and advanced analysis across SIEM, EDR, and cloud telemetry data.
  • Review and validate the accuracy of analyst investigations, providing constructive coaching.
  • Maintain and enhance SOC runbooks, playbooks, and automation workflows to improve efficiency and effectiveness.

Technical Skills Required

  • Advanced proficiency in SIEM, EDR, and threat analysis techniques.
  • Strong understanding of common intrusion methods, malware behavior, and cloud log telemetry.
  • Demonstrated ability to lead SOC investigations and interpret complex security evidence.
  • Proven experience in performing threat hunts and tuning detection rules.

Soft Skills Essential

  • Exceptional leadership and mentorship capabilities.
  • Ability to remain calm under pressure with meticulous attention to detail.
  • Excellent written and verbal communication skills.
  • A strong customer-focused mindset.

Minimum Qualifications

  • A minimum of 3 years of experience in a SOC or incident response role.
  • Previous experience leading investigations and coaching junior analysts.
  • Possession of relevant certifications such as GCIH, GCIA, CySA+, or equivalent.

Preferred Qualifications

  • Experience working within an MSSP or a multi-tenant SOC environment.
  • Familiarity with SOAR automation and advanced detection tuning.
  • Knowledge of cybersecurity frameworks including NIST, CIS, CMMC, and SOC 2.

Tools and Technologies Used

  • SIEM: Wazuh (Commercial and GCC High)
  • Ticketing: JIRA, ServiceNow, ServiceTrax (Internal)
  • Documentation: Confluence/SharePoint
  • Communication: MSFT Teams, Office365/Outlook
  • Event Correlation: NinjaOne
  • SIEM Ingestion/Customer Tooling: MSFT Defender for Cloud/Endpoint, Sentinel One, Office365, Proofpoint, and other sources
  • DarkWeb Monitoring/Intel: Kela

Company

Q3 technologies

Q3 technologies

Jaipur
Posted on Naukri