Your browser does not support javascript! Please enable it, otherwise web will not work for you.

SOC Analyst L3 (Sentinel is must) @ Rackspace Technology

Home > IT Security

 SOC Analyst L3 (Sentinel is must)

Job Description

About Rackspace Cyber Defence

Rackspace Cyber Defence is our next generation cyber defence and security operations capability that builds on 20+ years of securing customer environments to deliver proactive, risk-based, threat-informed and intelligence driven security services.

Our purpose is to enable our customers to defend against the evolving threat landscape across on-premises, private cloud, public cloud and multi-cloud workloads.

Our goal is to go beyond traditional security controls to deliver cloud-native, DevOps-centric and fully integrated 24x7x365 cyber defence capabilities that deliver a proactive, threat-informed, risk-based, intelligence-driven approach to detecting and responding to threats.


Our mission is to help our customers:

  • Proactively detect and respond to cyber-attacks 24x7x365.
  • Defend against new and emerging risks that impact their business.
  • Reduce their attack surface across private cloud, hybrid cloud, public cloud, and multi-cloud environments.
  • Reduce their exposure to risks that impact their identity and brand.
  • Develop operational resilience.
  • Maintain compliance with legal, regulatory and compliance obligations.

What were looking for

To support our continued success and deliver a Fanatical Experience to our customers, Rackspace Cyber Defence is looking for an Indian based Security Operations Analyst (L3) to support Rackspaces strategic customers.

This role is particularly well-suited to a self-starting, experienced and motivated Sr. Sec Ops Analyst, who has a proven record of accomplishment in the cloud security monitoring and incident detection domain.

As a Security Operations Analyst(L3), you will be responsible for detecting, analysing, and responding to threats posed across customer on-premises, private cloud, public cloud, and multi-cloud environments.

The primary focus will be on triaging alerts and events (incident detection), which may indicate malicious activity, and determining if threats are real or not.

You will also be required to liaise closely with the customers key stakeholders, which may include incident response and disaster recovery teams as well as information security.


Key Accountabilities:

  • Should have experience of 10 years in SOC and 5 years in Azure Sentinel.
  • Ensure the Customers operational and production environment remains secure at all the times and any threats are raised and addressed in a timely manner.
  • Critical incident handling & closure.
  • Escalation management and handling escalations from L2 Analysts.
  • Proactive discovery of threats based on MITRE ATT&CK framework.
  • Deep investigation and analysis of critical security incidents.
  • Post breach forensic incident analysis reporting.
  • Review the weekly and monthly reports.
  • Review new use cases created by L2 and implement in cloud-native SIEM (Security Information and Event Management).
  • Assist with customer onboarding (such as use case development, identifying data sources, configuring data connectors etc)
  • Advanced threat hunting.
  • Develop custom dashboards and reporting templates.
  • Develop complex to customer specific use cases.
  • Advanced platform administration.
  • Solution recommendation for issues.
  • Co-ordinate with vendor for issue resolution.
  • Basic and intermediate playbook and workflow enhancement.
  • Maintain close working relationships with relevant teams and individual key stakeholders, such as incident response and disaster recovery teams as well as information security etc.
  • Develop the custom parsers for the incident and alert enrichment.
  • Problem specific playbook and workflow creation and enhancements
  • Required to work flexible timings.

Skills and Experience:

  • Existing experience as a Security Operations Analyst, or equivalent.
  • Experience of working in large scale, public cloud environments and with using cloud native security monitoring tools such as:
  • Microsoft Sentinel
  • Microsoft 365 Defender
  • Microsoft Defender for Cloud
  • Endpoint Detection & Response (EDR) tools such as Crowdstrike, Microsoft Defender for Endpoint.
  • Firewalls and network security tools such as Palo Alto, Fortinet, Juniper, and Cisco.
  • Web Application Firewall (WAF) tools such as Cloudflare, Akamai and Azure WAF.
  • Email Security tools such as Proofpoint, Mimecast and Microsoft Defender for Office
  • Data Loss Prevention (DLP) tools such as Microsoft Purview, McAfee and Symantec

Job Classification

Industry: IT Services & Consulting
Functional Area / Department: IT & Information Security
Role Category: IT Security
Role: Cyber Security
Employement Type: Full time

Contact Details:

Company: Rackspace Technology
Location(s): Noida, Gurugram

+ View Contactajax loader


Keyskills:   SOC Microsoft Sentinel kql defender

 Fraud Alert to job seekers!

₹ Not Disclosed

Similar positions

Security Analyst and IAM

  • Photon
  • 6 - 9 years
  • Kolkata
  • 3 days ago
₹ Not Disclosed

Security Analyst

  • Cirruslabs
  • 2 - 4 years
  • Hyderabad
  • 3 days ago
₹ 12-14 Lacs P.A.

SOC Manager

  • Sonata Software
  • 7 - 10 years
  • Bengaluru
  • 4 days ago
₹ Not Disclosed

Soc Analyst For -mumbai -4+yrs.exp Xdr,siem,soar

  • Locuz
  • 4 - 8 years
  • Mumbai
  • 5 days ago
₹ Not Disclosed

Rackspace Technology

About Rackspace Technology We are the multicloud solutions experts. We combine our expertise with the world's leading technologies — across applications, data and security — to deliver end-to-end solutions. We have a proven record of advising customers based on their business challenge...