
CGI•18d ago
Naukri
Soc Analyst L2
Hybrid - Bengaluru, Chennai
Full Time
Mid Level
Full Job Description
Role Summary: We are seeking a proficient Level 2 Security Operations Center (SOC) Analyst to conduct advanced security monitoring, sophisticated threat investigations, and decisive incident response across diverse enterprise environments. This role demands extensive hands-on expertise with Microsoft Defender, Microsoft Sentinel, and Splunk, coupled with a strong capability in phishing investigations and established incident response methodologies.
Key Responsibilities:
- Conduct in-depth analysis and triage of security alerts escalated from L1 SOC analysts.
- Investigate security incidents across endpoints, email, network, and cloud platforms.
- Monitor and respond to incidents utilizing Microsoft Sentinel, including KQL querying and detection rule tuning.
- Analyze threats using Microsoft Defender suite (Defender for Endpoint, Office 365, and Cloud).
- Perform phishing investigations leveraging tools such as Cofense and Proofpoint.
- Analyze and correlate logs using Splunk to identify anomalous activities.
- Validate alerts, determine root causes, and propose effective remediation strategies.
- Manage incident escalations to L3 teams and collaborate effectively with infrastructure and Incident Response (IR) teams.
- Support containment, eradication, and recovery efforts during security incidents.
- Develop and maintain comprehensive incident reports, Standard Operating Procedures (SOPs), and security playbooks.
- Contribute to use-case tuning, dashboard enhancements, and the reduction of false positives.
- Participate in proactive threat hunting and continuous improvement initiatives.
Required Skills:
- 2–4 years of experience in SOC Operations or Cybersecurity Monitoring.
- Strong hands-on experience with Microsoft Defender, Microsoft Sentinel (KQL), and Splunk (Log Analysis).
- Proficiency in Phishing Investigation Tools (Cofense / Proofpoint).
- Solid understanding of the MITRE ATT&CK Framework, Incident Response Lifecycle, and common attack vectors including malware, ransomware, phishing, and identity-based attacks.
- Excellent analytical, troubleshooting, and documentation skills.
Good-to-Have Skills:
- Experience with Threat Hunting and Security Use-Case Development.
- Exposure to Azure Security and Security Orchestration, Automation, and Response (SOAR) tools.
- Experience with SPL (Splunk Query Language).
- Knowledge of automation and security orchestration concepts.
Preferred Certifications:
- Microsoft SC-200 – Security Operations Analyst
- Splunk Core Certified Power User / Enterprise Security
- GIAC (GCIA, GCIH)
- CEH / CySA+
Company
CGI
Hybrid - Bengaluru, Chennai
Posted on Naukri