SOC L2/L3
Tata Consultancy Services
5 - 7 years
Hyderabad
Posted: 16/03/2026
Getting a referral is 5x more effective than applying directly
Job Description
Greetings from TCS!!!
Role: SOC L2/L3
Experience: 6 to 15 years
Location: Hyderabad/Chennai/Bangalore
***Drive date: 21-March-2026***
Mode of interview: Walkin
Job Description:
- Proactively search for threats that may not trigger alerts, utilizing threat intelligence and advanced analytical skills.
- Lead and coordinate responses to critical security incidents, including containment, eradication, and recovery.
- Create and refine detection rules and security use cases for SIEM and other security tools.
- Correlate data from threat intelligence feeds and other sources to identify emerging threats and vulnerabilities.
- Investigate complex security incidents to determine the root cause and prevent future occurrences.
- Maintain accurate and detailed records of incidents, investigations, and remediation steps.
- Work with other teams, such as engineering and IT, to improve security posture and implement necessary changes.
- Effectively communicate with stakeholders, including technical and non-technical personnel, about security incidents and status.
- Able to connect any type of logs and from any type of source to Sentinel Log Analytic workspace.
- Should have hands on experience in creating playbook, analytic rule, workbooks, notebooks for incident Threat hunting.
- Develop and automate incident response capability
- If asked for, build custom detection rules on Defender based on ad hoc requests by client
- Guide and train L1 and L2 analysts, sharing knowledge and expertise to improve the team's overall capabilities.
- Experience in Sentinel SIEM tool, Fine tuning of Rules.
- Knowledge of different Microsoft Defender products. Implementation and integration of defender for cloud services.
- Automation Rule creation along with creation of Playbooks, Workbooks.
- Leadership & Team management skills during their approved shifts.
- Experience in cloud computing and cloud security role.
- Experience in Azure security role.
- Experience in automation in SOC area.
- Minimum 5 years of experience in Microsoft Sentinel and Azure log analytics and developing Kusto Query Language Experience in SIEM and SOAR implementation.
- Should have experience in developing KQL queries for data normalization and parsing capability for Log Analytics data ingestion pipeline.
- Highly proficient in Microsoft Sentinel and Azure Log Analytics.
Thanks & Regards
Sindhuja Polisetty
HR TAG Cyber Security
Tata Consultancy Services
Services you might be interested in
Improve Your Resume Today
Boost your chances with professional resume services!
Get expert-reviewed, ATS-optimized resumes tailored for your experience level. Start your journey now.
