Login Sign Up
🔔 FCM Loaded

SME - Threat Hunter

SHI Solutions India Pvt. Ltd.

10 - 12 years

Hyderabad

Posted: 15/03/2026

Getting a referral is 5x more effective than applying directly

Job Description

SOC Threat Hunter

Location: Hyderabad

Experience: 810 Years


We are looking for an experienced SOC Threat Hunter with strong expertise in SOC operations, SIEM management, threat detection, and incident response.

Key Skills

  • 810 years of experience in a Global Security Operations Center (SOC).
  • Hands-on experience with SIEM tools such as Splunk, QRadar, or ArcSight.
  • Strong experience in incident triage, investigation, and threat hunting.
  • Knowledge of MITRE ATT&CK framework and Cyber Kill Chain.
  • Experience with Vulnerability Management tools like Tenable, Rapid7, Qualys, Nmap, and Burp Suite.
  • Experience in Vulnerability Assessment & Penetration Testing (VA/PT) for infrastructure and web applications.
  • Ability to analyze network, firewall, proxy, and application logs.
  • Good understanding of networking and security infrastructure (routers, switches, firewalls).
  • Experience with SOAR, XDR, IDS/IPS, UEBA, and threat intelligence tools.

Key Responsibilities

Security Monitoring & Threat Detection

  • Monitor systems, APIs, and connectivity platforms for security threats, anomalies, and vulnerabilities.
  • Manage and support SIEM environments across UAT and Production (DC/DR).
  • Use SIEM, network telemetry, and behavioral analytics to detect threats.

Threat Intelligence & Incident Response

  • Track zero-day vulnerabilities, APT campaigns, and emerging threats.
  • Perform incident triage, investigation, containment, and recovery.
  • Conduct root cause analysis and post-incident reviews.
  • Coordinate with regulatory authorities like SEBI, CERT-In, and RBI when required.
  • Conduct red team / blue team exercises and cyber drills.

SOC Operations & Optimization

  • Manage SOC tools, dashboards, correlation rules, and alerts.
  • Implement SOAR automation and detection improvements.
  • Work with NOC, IT operations, and DR teams to improve security resilience.
  • Ensure proper log management, forensic readiness, and compliance.

Compliance & Governance

  • Support regulatory reporting and compliance requirements.
  • Develop and maintain SOC policies, SOPs, runbooks, and incident response playbooks.
  • Implement proactive threat hunting programs and improve SOC maturity.

Required Experience

  • Minimum 6+ years of hands-on experience with IBM QRadar (administration, rule tuning, log onboarding, dashboards, AQL, DSM, correlation rules).
  • Strong experience in SIEM/SOC operations, threat detection, and incident response.
  • Understanding of financial services threat landscape.

Preferred Certifications

ITIL, CCNA, CEH or similar cybersecurity certifications.

Key Competencies

  • Strong analytical thinking and problem-solving skills
  • Good communication and coordination abilities
  • Ability to manage major security incidents in regulated environments


Interested candidates can share their CV at:

annapurna.t@locuz.com

Services you might be interested in

Improve Your Resume Today

Boost your chances with professional resume services!

Get expert-reviewed, ATS-optimized resumes tailored for your experience level. Start your journey now.