- Escritório em Bengaluru
Description
ever.
We are seeking an L3 SOC Analyst - Cloud & Automation to serve as a senior technical expert and escalation point within our SOC. This role is for a hands-on-keyboard expert who thrives on hunting for advanced threats, automating responses, and mentoring junior analysts. You will be a key player in handling complex incidents, particularly those involving cloud environments, and
will be responsible for building and tuning the automation that allows our team to scale.
What You Will Be Doing
● Serve as the final technical escalation point for complex security incidents escalated from L1/L2 analysts.
● Conduct in-depth forensic analysis of compromised systems, kubernetes containers, malware, and network traffic to determine the full scope of an incident (root cause,
impact, remediation).
● Lead the response to high-severity security incidents, especially those originating in or targeting our cloud infrastructure (AWS, Azure).
● Analyze and correlate data from diverse sources (e.g., SIEM, EDR, CSPM, cloud-native logs) to uncover sophisticated attack patterns.
Security Automation & Orchestration
● Design, build, and maintain automated response playbooks in our SOAR platform to handle high-volume alerts and repetitive tasks.
● Develop and maintain custom AI agents to automate evidence collection, alert enrichment, and containment actions.
● Integrate security tools (EDR, SIEM, Cloud Security tools) via APIs to create seamless,
automated workflows.
● Proactively hunt for undetected threats across our enterprise and cloud environments using hypothesis-driven and intelligence-driven methods.
● Act as a Subject Matter Expert (SME) for cloud security monitoring, utilizing native tools like AWS GuardDuty, CloudTrail, CrowdStrike, Proofpoint,etc.
● Develop and tune advanced detection rules, SIEM correlation searches, and EDR queries based on new threat intelligence, hunting findings, and MITRE ATT&CK tactics.
Mentorship & Continuous Improvement
● Mentor and provide technical guidance to L1 and L2 analysts, helping to build their analytical and technical skills.
● Create and refine SOC documentation, including standard operating procedures (SOPs), runbooks, and incident response plans.
● Analyze incident trends and automation metrics to provide recommendations for improving security posture, detection logic, and playbook effectiveness.
What You Bring
● 6-10 years of experience in a Security Operations (SOC) environment, with at least 4 years in a senior analyst, threat hunter, or L2/L3 role.
● Strong Cloud Security Skills: Deep, hands-on experience with security monitoring and incident response in at least one major cloud provider (AWS, Azure, or GCP).
● Strong Automation & AI Skills: Proven ability to write scripts for automation with an ability to implement AI based automations for SOC use cases.
● Technical Expertise: Hands-on experience with SOAR platforms (e.g., CrowdStrike Fusion, Splunk SOAR) and SIEMs (e.g., Splunk, QRadar, CrowdStrike Falcon).
● Deep understanding of modern EDR solutions, container security, and host/system.
● Expert-level knowledge of the MITRE ATT&CK framework and its application to threat hunting and detection engineering.
Why Join Us
● Drive the automation strategy that defines how our SOC operates and scales.
● Work with cutting-edge cloud-native security, automation, and threat intelligence technologies.
● Collaborate with world-class security and engineering leaders in a high-impact, hands-on role.