L2 SOC Security Analyst (SIEM, EDR, Incident Analysis)
Cloud4C Services
0 - 3 years
Hyderabad
Posted: 03/05/2026
Getting a referral is 5x more effective than applying directly
Job Description
Number of Positions: 2
Location: Hyderabad (Work from Office Mandatory)
Experience: 35 Years
Compensation: 10 12 LPA
Summary
24/7 Managed SOC, the L2 Analyst is responsible for real-time threat monitoring, alert analysis, incident triage, and response across hybrid cloud and on-prem environments.
Skills & Responsibilities
- 35 years in SOC / Incident Response
- Perform real-time monitoring of security events via SIEM, EDR, and threat intelligence platforms
- Analyze and validate alerts generated from correlation rules, anomaly detection, and behavioral analytics
- Conduct incident triage, investigation, and escalation to L3 teams
- Execute threat response actions (containment, endpoint isolation, blocking malicious activity)
- Perform log analysis across cloud, network, endpoint, and application layers
- Support root cause analysis (RCA) and incident reporting
- Reduce false positives through tuning and correlation improvements
- Ensure adherence to SLA-driven response timelines (MTTD / MTTR reduction)
Required
- Hands-on SIEM (Microsoft Sentinel, QRadar, Splunk)
- EDR/XDR tools (Microsoft Defender, CrowdStrike, etc.)
- Knowledge of MITRE ATT&CK, threat lifecycle, IOC analysis
- Understanding of cloud security monitoring (Azure/AWS/GCP)
- Experience in SOC environments with alert management & log correlation
Services you might be interested in
Improve Your Resume Today
Boost your chances with professional resume services!
Get expert-reviewed, ATS-optimized resumes tailored for your experience level. Start your journey now.
