Login Sign Up

Security Operations Manager

ESDS Software Solution Limited

5 - 10 years

Nasik

Posted: 16/05/2026

Getting a referral is 5x more effective than applying directly

Job Description

1. Security Incident Response & Investigation

  • Lead the investigation and remediation of escalated security incidents.
  • Perform deep forensic analysis on compromised hosts, network traffic, and logs.
  • Conduct root cause analysis (RCA) and recommend long-term security improvements.
  • Guide L1 and L2 analysts in incident handling and provide technical expertise.
  • Ensure effective containment, eradication, and recovery strategies for incidents.

2. Threat Hunting & Threat Intelligence

  • Proactively hunt for threats using SIEM, EDR, and network monitoring tools.
  • Analyze logs, network flows, and endpoint behaviors to detect advanced threats.
  • Integrate Threat Intelligence (TI) feeds into detection and response workflows.
  • Research and track APT (Advanced Persistent Threat) groups and emerging attack tactics.

3. Security Engineering & SIEM Tuning

  • Develop and fine-tune security rules, correlation logic, and alerts in SIEM (e.g., Splunk, QRadar, Sentinel).
  • Improve automation workflows using SOAR (Security Orchestration, Automation, and Response).
  • Optimize IDS/IPS, firewalls, and endpoint security configurations to enhance protection.
  • Identify false positives and adjust detection mechanisms accordingly.

4. Digital Forensics & Malware Analysis

  • Conduct forensic analysis on compromised systems, including memory and disk analysis.
  • Reverse-engineer malware to understand its behavior and identify Indicators of Compromise (IoCs).
  • Preserve and analyze digital evidence for legal or compliance investigations.
  • Develop playbooks and procedures for handling various attack scenarios.

5. Incident Handling & Playbook Development

  • Create and refine incident response playbooks and workflows.
  • Ensure alignment with industry best practices (NIST, MITRE ATT&CK, Cyber Kill Chain).
  • Collaborate with Red Team to validate detections and improve SOC maturity.
  • Provide hands-on training and mentorship to junior SOC analysts.

6. Compliance & Reporting

  • Ensure compliance with industry standards (ISO 27001, NIST, PCI-DSS, GDPR).
  • Generate security reports and brief executive leadership on threats and incidents.
  • Support security audits, risk assessments, and compliance initiatives.

Key Responsibilities

1. Security Incident Response & Investigation

  • Lead the investigation and remediation of escalated security incidents.
  • Perform deep forensic analysis on compromised hosts, network traffic, and logs.
  • Conduct root cause analysis (RCA) and recommend long-term security improvements.
  • Guide L1 and L2 analysts in incident handling and provide technical expertise.
  • Ensure effective containment, eradication, and recovery strategies for incidents.

2. Threat Hunting & Threat Intelligence

  • Proactively hunt for threats using SIEM, EDR, and network monitoring tools.
  • Analyze logs, network flows, and endpoint behaviors to detect advanced threats.
  • Integrate Threat Intelligence (TI) feeds into detection and response workflows.
  • Research and track APT (Advanced Persistent Threat) groups and emerging attack tactics.

3. Security Engineering & SIEM Tuning

  • Develop and fine-tune security rules, correlation logic, and alerts in SIEM (e.g., Splunk, QRadar, Sentinel).
  • Improve automation workflows using SOAR (Security Orchestration, Automation, and Response).
  • Optimize IDS/IPS, firewalls, and endpoint security configurations to enhance protection.
  • Identify false positives and adjust detection mechanisms accordingly.

4. Digital Forensics & Malware Analysis

  • Conduct forensic analysis on compromised systems, including memory and disk analysis.
  • Reverse-engineer malware to understand its behavior and identify Indicators of Compromise (IoCs).
  • Preserve and analyze digital evidence for legal or compliance investigations.
  • Develop playbooks and procedures for handling various attack scenarios.

5. Incident Handling & Playbook Development

  • Create and refine incident response playbooks and workflows.
  • Ensure alignment with industry best practices (NIST, MITRE ATT&CK, Cyber Kill Chain).
  • Collaborate with Red Team to validate detections and improve SOC maturity.
  • Provide hands-on training and mentorship to junior SOC analysts.

6. Compliance & Reporting

  • Ensure compliance with industry standards (ISO 27001, NIST, PCI-DSS, GDPR).
  • Generate security reports and brief executive leadership on threats and incidents.
  • Support security audits, risk assessments, and compliance initiatives.

Required Skills & Qualifications:

1. Technical Skills:

  • Strong expertise in SIEM platforms (Splunk, QRadar, Microsoft Sentinel, ArcSight).
  • Experience with Endpoint Detection & Response (EDR) solutions (CrowdStrike, Carbon Black, Defender ATP).
  • Proficiency in Threat Intelligence Platforms (TIPs) and MITRE ATT&CK framework.
  • Hands-on experience with IDS/IPS, Firewalls, Proxy, WAF, and Network Security Monitoring (NSM) tools.
  • Knowledge of digital forensics & malware analysis using tools like Volatility, Autopsy, or IDA Pro.
  • Strong understanding of cloud security (Azure, AWS, GCP) and container security (Kubernetes, Docker).
  • Experience in security automation using Python, PowerShell, or Bash scripting.

2. Soft Skills:

  • Strong analytical and problem-solving skills.
  • Excellent communication and documentation skills.
  • Ability to work independently and handle high-pressure incidents.
  • Leadership and mentoring skills to support SOC team growth.
  • GIAC Certified Forensic Analyst (GCFA) or GIAC Reverse Engineering Malware (GREM)
  • Microsoft SC-200 (Security Operations Analyst Associate)



Qualification & Certification

Any Graduate (IT, Computers, ENTC, Electronics).

Certifications (Preferred but not Mandatory):

  • Certified Incident Handler (GCIH) GIAC
  • Certified Information Systems Security Professional (CISSP)
  • Certified Ethical Hacker (CEH)

EXPERIENCE

5+ years of experience in a SOC, cybersecurity, or threat intelligence role.

Strong background in incident handling, forensics, and SIEM management.

Experience with attack simulation, penetration testing, or red team exercises is a plus.

Services you might be interested in

Improve Your Resume Today

Boost your chances with professional resume services!

Get expert-reviewed, ATS-optimized resumes tailored for your experience level. Start your journey now.