Login Sign Up

L2 SOC Security Analyst (SIEM, EDR, Incident Analysis)

Cloud4C Services

0 - 3 years

Hyderabad

Posted: 03/05/2026

Getting a referral is 5x more effective than applying directly

Job Description

Number of Positions: 2

Location: Hyderabad (Work from Office Mandatory)

Experience: 35 Years

Compensation: 10 12 LPA


Summary

24/7 Managed SOC, the L2 Analyst is responsible for real-time threat monitoring, alert analysis, incident triage, and response across hybrid cloud and on-prem environments.


Skills & Responsibilities

  • 35 years in SOC / Incident Response
  • Perform real-time monitoring of security events via SIEM, EDR, and threat intelligence platforms
  • Analyze and validate alerts generated from correlation rules, anomaly detection, and behavioral analytics
  • Conduct incident triage, investigation, and escalation to L3 teams
  • Execute threat response actions (containment, endpoint isolation, blocking malicious activity)
  • Perform log analysis across cloud, network, endpoint, and application layers
  • Support root cause analysis (RCA) and incident reporting
  • Reduce false positives through tuning and correlation improvements
  • Ensure adherence to SLA-driven response timelines (MTTD / MTTR reduction)

Required

  • Hands-on SIEM (Microsoft Sentinel, QRadar, Splunk)
  • EDR/XDR tools (Microsoft Defender, CrowdStrike, etc.)
  • Knowledge of MITRE ATT&CK, threat lifecycle, IOC analysis
  • Understanding of cloud security monitoring (Azure/AWS/GCP)
  • Experience in SOC environments with alert management & log correlation

Services you might be interested in

Improve Your Resume Today

Boost your chances with professional resume services!

Get expert-reviewed, ATS-optimized resumes tailored for your experience level. Start your journey now.