Cyber Security Analyst
Tata Consultancy Services
0 - 3 years
Chennai
Posted: 04/04/2026
Getting a referral is 5x more effective than applying directly
Job Description
Company : TCS
Skill : Threat Hunting
Experience Range : 6 to 15 Years
Location : Chennai & Hyderabad
Interview Mode : Face to Face (Walkin)
Note : Pls apply only if available for the face to face interview on 4th April 2026 (Saturday)
Job Description :
Proactive Threat Hunting
- Conduct hypothesis-driven and data-driven threat hunting across endpoints, networks, cloud, and identity systems.
- Identify anomalous behaviors, TTPs, and indicators of compromise using MITRE ATT&CK and threat intel sources.
- Perform deep-dive investigation into suspicious activities, lateral movement, privilege escalation, and persistence techniques.
Analysis & Detection Engineering
- Analyze logs, telemetry, and events from SIEM, EDR, XDR, NDR, Firewall, and Cloud security tools.
- Develop new detection rules, signatures, and behavioral analytics to improve SOC detection capabilities.
- Validate, tune, and optimize detection logic to reduce false positives.
Threat Intelligence Integration
- Consume threat intel reports, IOCs, malware analysis feeds, and emerging threat trends.
- Translate threat intel into actionable hunting queries, playbooks, and detection rules.
- Track APT groups, campaigns, and emerging vulnerabilities (CVEs).
Incident Response Support
- Collaborate with SOC Analysts and Incident Response teams during investigations.
- Provide recommendations for containment, remediation, and hardening.
- Perform root-cause analysis on identified threats.
Reporting & Documentation
- Prepare detailed hunt reports, findings, and risk insights for leadership.
- Document new hunting methodologies, playbooks, and detection logic.
Required Skills and Qualifications
- Experience in Threat Hunting, SOC, Incident Response, or Cyber Defense.
- Strong understanding of:
- MITRE ATT&CK Framework
- Windows/Linux internals
- Network protocols (TCP/IP, DNS, HTTP, etc.)
- Cloud platforms (AWS, Azure, GCP)
- Hands-on experience with SIEM/EDR/XDR tools such as:
- Splunk, Sentinel, QRadar, ELK
- CrowdStrike, Defender ATP, Tanium, Carbon Black, Palo Alto Cortex
- Ability to write complex queries using:
- KQL, SQL, SPL, YARA, Sigma rules
- Experience analyzing malicious files, scripts, and techniques used by APT groups.
- Strong analytical, investigative, and problemsolving skills.
Services you might be interested in
Improve Your Resume Today
Boost your chances with professional resume services!
Get expert-reviewed, ATS-optimized resumes tailored for your experience level. Start your journey now.
