Posted on: 31/10/2025
What You Will Do :
- Triage alerts and investigates incidents across SIEM, EDR and network data sources.
- Perform forensic analysis, identify root causes and recommend containment and remediation steps.
- Proactively hunt for unknown threats using MITRE ATT&CK and threat intelligence feeds.
- Tune detection rules and provide feedback to improve automation and detection accuracy.
- Develop incident response playbooks and mentor junior analysts.
- Support vulnerability management and compliance activities (HIPAA, GDPR, etc.).
What makes you a great fit :
- 3-7 years SOC experience in L2/L3 incident response and threat hunting.
- Hands-on with SIEM (e.g., Splunk, QRadar), EDR (e.g., CrowdStrike) and SOAR tools.
- Strong knowledge of OS, networking and log analysis; scripting skills (Python, PowerShell) preferred.
- Familiar with MITRE ATT&CK, cyber kill chain and IR frameworks.
- Excellent communication and collaboration skills; mentoring experience is a plus.
- Relevant degree or certifications preferred.
Why join us :
- Influence next-gen AI-driven security products.
- Grow into a SOC leadership role.
- Continuous learning in a fast-evolving threat landscape.
Did you find something suspicious?
Posted By
Aswathy Baby
Talent Acquisition Specialist at KeyValue Software Systems Private Limited
Last Active: 31 Oct 2025
Posted in
CyberSecurity
Functional Area
IT Security
Job Code
1567387
Interview Questions for you
View All