Senior Security Operations Center Analyst (Qradar) || Mumbai || 8 Year+ || Only Immediate Joiner
Innova ESI
5 - 10 years
Mumbai
Posted: 12/02/2026
Getting a referral is 5x more effective than applying directly
Job Description
SOC Analyst L3
Location: Mumbai
Experience: 8+ Years
Role: Security Operations Center (SOC) Analyst L3
Job Summary
The SOC Analyst L3 will act as a senior escalation point within the Security Operations Center, responsible for advanced threat analysis, incident response, security monitoring, and guiding L1/L2 teams. The role requires deep expertise in SIEM platforms, threat hunting, malware analysis, and security incident lifecycle management.
Key Responsibilities
- Lead security incident investigations and coordinate end-to-end incident response activities.
- Perform advanced threat hunting to identify hidden, sophisticated attacks.
- Analyze and respond to critical security alerts escalated by L1/L2 analysts.
- Conduct in-depth malware analysis, log analysis, and forensic investigations.
- Develop detection rules, correlation logic, and use cases in SIEM tools (e.g., Splunk, QRadar, ArcSight).
- Provide guidance, mentoring, and technical leadership to L1/L2 SOC staff.
- Review and improve SOC processes, runbooks, and incident workflows.
- Validate, tune, and optimize SIEM alerts to reduce false positives.
- Create incident reports, RCA documentation, and executive summaries.
- Integrate new threat intel feeds and apply intelligence to active investigations.
- Support auditing, compliance, and vulnerability remediation actions.
- Collaborate with security engineering, network teams, and IT teams during investigations.
Required Technical Skills
- Expertise in SIEM technologies: Splunk / QRadar / ArcSight / Sentinel.
- Strong knowledge of SOC operations, IR lifecycle, MITRE ATT&CK framework.
- Advanced skills in log analysis, packet analysis, network security, and Linux/Windows internals.
- Experience with Firewalls, IDS/IPS, EDR tools (CrowdStrike, Carbon Black, SentinelOne).
- Hands-on with Threat Hunting, Forensics, and Malware Analysis.
- Good understanding of Cloud Security (AWS/Azure) monitoring and logs.
- Expertise in Threat Intelligence platforms, IOC/IOA enrichment, and use-case creation.
- Scripting ability (Python, PowerShell, Bash) for automation is an added advantage.
Soft Skills
- Strong analytical and problem-solving ability.
- Excellent communication and documentation skills.
- Ability to handle high-severity incidents under pressure.
- Leadership and mentoring capabilities.
Education & Certifications (Preferred)
- Bachelors degree in IT/CS or related field.
- Certifications such as CEH, ECSA, GCIH, GCIA, SIEM-specific certifications, CompTIA Security+, CySA+, or equivalent.
Services you might be interested in
Improve Your Resume Today
Boost your chances with professional resume services!
Get expert-reviewed, ATS-optimized resumes tailored for your experience level. Start your journey now.
