Your browser does not support javascript! Please enable it, otherwise web will not work for you.

L2 SOC Analyst @ CyberShelter

Home > IT Security

 L2 SOC Analyst

Job Description

Investigate, hunt, and lead escalated incident response using advanced threat detection from SIEM, EDR, NDR platforms. Develop and manage custom detection use cases aligned to threat frameworks and customer environments.


Key Responsibilities:

  • Monitoring, Investigation & Triage
  • Triage and correlate alerts from SIEM (QRadar/Sentinel), EDR, and NDR
  • Identify lateral movement, C2 activity, and data exfiltration
  • Lead incident investigations and initiate containment measures
  • Threat Hunting & Detection Engineering
  • Proactive hunting using logs, flow data, and behavior analytics
  • Apply MITRE ATT&CK for hypothesis-driven hunts
  • Develop, test, and optimize custom detection rules
  • Maintain a backlog aligned with emerging threats

Tool Proficiency

  • SIEM: Advanced KQL/AQL queries, rule tuning, alert optimization
  • EDR: Defender for Endpoint binary/process analysis, endpoint containment
  • NDR: Darktrace/LinkShadow behavioral baselining, detection logic
  • SOAR: Sentinel Playbooks / Cortex XSOAR for automated workflows
  • Cloud Security: Azure AD alerts, MCAS, Defender for Cloud, M365 Defender

Threat Intelligence Integration

  • IOC/TTP enrichment
  • Threat intel feed integration
  • Contextual alert correlation

Reporting & RCA

  • Draft technical incident reports and RCAs
  • Executive-level summaries for major incidents

Cloud Security (Optional):

  • Investigate alerts like impossible travel, app consent abuse
  • Respond to cloud-native security incidents using Defender for Cloud, MCAS
  • Create advanced SOAR workflows and playbook

Tool Familiarity

  • QRadar
  • Microsoft Sentinel
  • Microsoft Defender for Endpoint
  • LinkShadow or Darktrace
  • EOP/Exchange protection
  • Antivirus platforms
  • Defender for Identity / Defender for Cloud
  • Advanced SOAR workflows (Sentinel playbooks / Cortex XSOAR)
  • Network forensic tools like Wireshark / Zeek

Certifications (Preferred):

  • GCIH / GCIA / CEH
  • Microsoft SC-200 / SC-100
  • QRadar Admin or equivalent

Shift Readiness:

24x7 rotational shifts, including on-call support for escalations and major incidents


Soft Skills:

  • Strong analytical and documentation skills
  • Proactive communicator
  • Independent problem-solver and critical thinker

Job Classification

Industry: IT Services & Consulting
Functional Area / Department: IT & Information Security
Role Category: IT Security
Role: Security Engineer / Analyst
Employement Type: Full time

Contact Details:

Company: CyberShelter
Location(s): Kochi

+ View Contactajax loader


Keyskills:   SOC Operations Cloud Security Defender for Identity Defender for Endpoint KQL Detection Engineering SOAR Threat Intel Incident Response MITRE ATT&CK Threat Hunting Microsoft Sentinel SIEM Use Case Development Darktrace QRadar Cortex XSOAR LinkShadow

 Fraud Alert to job seekers!

₹ Not Disclosed

Similar positions

Cyber Threat Intelligence Analyst

  • Fortinet Technologies
  • 3 - 7 years
  • Pune
  • 3 days ago
₹ Not Disclosed

Cyber Security Analyst - L4

  • Wipro
  • 5 - 8 years
  • Hyderabad
  • 6 days ago
₹ Not Disclosed

Cyber Security Analyst - L4

  • Wipro
  • 5 - 8 years
  • Hyderabad
  • 6 days ago
₹ Not Disclosed

Security Administrator L2

  • National Informatics
  • 5 - 10 years
  • Noida, Gurugram
  • 6 days ago
₹ Not Disclosed

CyberShelter

Founded by Cybersecurity stalwarts and passionate investors, CyberShelter (CS) is here to make a difference in how organisations protect their valuable assets. In an industry where practical and cost-effective solutions are rare, CS brings innovative approaches and robust cybersecurity experience to...