Job Category: Security and Opreations
Job Type: Full Time
Job Location: Delhi/NCR
Company Name: One of the leading IT comapny
Your consultant for this Job: karishma - Management 2000 CareerZodiac.comInterested IN this Job?
Yes NoExperience Level: 3 – 6 Years
Role Overview:
The L2 SOC Engineer handles advanced incident analysis, VAPT remediation validation, and threat hunting. This role is responsible for in-depth investigation, vulnerability correlation, and remediation enforcement within Data Center (DC) and DR environments, ensuring compliance with organizational security baselines.
Key Responsibilities:
- Analyze, investigate, and respond to security incidents escalated from L1 and identify patterns of potential attacks.
- Conduct threat analysis, root cause investigations, and coordinate containment and remediation.
- Lead Vulnerability Assessment and Penetration Testing (VAPT) exercises in coordination with internal and external teams.
- Evaluate and track VAPT remediation, ensuring closure of vulnerabilities within SLA timelines.
- Perform log correlation and threat hunting to detect anomalous activities across DC and DR infrastructure.
- Integrate and optimize SIEM correlation rules, alerts, and dashboards for enhanced visibility.
- Conduct endpoint, firewall, and application log analysis for proactive risk detection.
- Review and recommend patch management and system hardening policies.
- Develop and maintain Standard Operating Procedures (SOPs) for incident response and remediation.
- Participate in periodic security posture assessments and compliance audits.
- Coordinate with infrastructure, network, and application teams to remediate identified risks and ensure DC/DR protection.
- Assist in the deployment of IDS/IPS, firewall policy tuning, and malware containment.
Day-to-Day Activities:
- Review and investigate alerts for malicious or suspicious activity.
- Validate VAPT reports and remediation evidence across systems and applications.
- Perform threat hunting using log correlation and intelligence feeds.
- Conduct post-incident analysis (RCA) for security breaches or violations.
- Monitor and ensure security patch levels across servers and network appliances.
- Generate weekly and monthly SOC performance and vulnerability closure reports.
Qualifications:
- Bachelor’s degree in Computer Science, Information Security, or related field.
- 3–6 years of SOC or cybersecurity operations experience.
- Strong knowledge of SIEM, IDS/IPS, vulnerability management, and incident response frameworks (NIST, MITRE ATT&CK).
- Hands-on with VAPT tools – Qualys, Nessus, Burp Suite, Metasploit, or OpenVAS.
- Familiar with Atempo Miria/PVIEW for data security and backup validation (nice to have).
- Understanding of cloud and hybrid infrastructure (AWS, Azure, GCP) security.
Certifications (preferred): CEH, CompTIA CySA+, EC-Council ECIH, Microsoft SC-200, Splunk Certified Power User.
Salary: Upto: 11.5 LPA