🔔 FCM Loaded

SOC Expert

Vardaan Data Sciences Pvt. Ltd.

2 - 5 years

Hyderabad

Posted: 28/12/2025

Getting a referral is 5x more effective than applying directly

Job Description

We are seeking aSOC Expert with strongexpertiseinSecurity Information and Event Management (SIEM) usingManageEngine Log360 . The ideal candidate willbe responsible forestablishingSOC procedures , configuring log pipelines, and ensuring efficient security monitoring and incident response.

Key Responsibilities:

  • SOC Setup & Management:
  • Design and implementSOC procedures for proactive security threat detection.
  • Establishlog pipelines for structured event correlation across multiple security layers.
  • MaintainSIEM configurations tooptimizeevent logging, analysis, and alerting.
  • ManageEngine Log360 Configuration:
  • ConfigureManageEngine Log360 tomonitorsecurity logs, user activities, and access control violations.
  • Implementevent correlation rules to detect anomalies and potential threats.
  • Developcustom dashboards for security analytics, reporting, and compliance tracking.
  • Optimizelog ingestion, parsing, and alert mechanisms for streamlined SOC operations.
  • Threat Detection & Incident Response:
  • Configurereal-time security monitoring andanalyzeevent logs for potential threats.
  • Configure Log360 to issue alert to audience to respond tosecurity incidents , performing forensic investigation and remediation.
  • Define and refineincident response playbooks for efficient resolution and mitigation.
  • Compliance & Risk Management:
  • Ensure SOC procedures align withregulatory compliance frameworks (e.g., GDPR, ISO 27001, NIST, PCI-DSS).
  • Implementrisk mitigation strategies to protect IT infrastructure from evolving threats.
  • Collaborate with IT and security teams to enhancecyber resilience and data protection .

Required Skills & Qualifications:

  • StrongexpertiseinSecurity OperationsCenter(SOC) procedures and frameworks.
  • Hands-on experience inManageEngine Log360 configuration and SIEM management.
  • Proficiencyinlog pipeline design, event correlation, and incident response .
  • Knowledge ofnetwork security, access controls, and endpoint protection .
  • Familiarity withcompliance standards such as NIST, ISO 27001, and GDPR.
  • Ability to designcustom threat detection dashboards and security analytics reports .
  • Excellent problem-solving, analytical, and documentation skills.

Preferred Qualifications:

  • Certifications such as CISSP, CEH, or Security+.
  • Experience withother security monitoring tools like Splunk,QRadar, or ArcSight.
  • Strong understanding ofintrusion detection systems (IDS) and vulnerability assessment techniques .
  • Knowledge ofcloud security and log monitoring for hybrid environments .
  • Graduate degree
  • Minimum 4 years in the desired profile


Services you might be interested in

Improve Your Resume Today

Boost your chances with professional resume services!

Get expert-reviewed, ATS-optimized resumes tailored for your experience level. Start your journey now.