Security Operations Center Analyst || 7 Year+ || Mumbai || Only Immediate Joiner
Actively Reviewing the ApplicationsInnova ESI
Mumbai, Maharashtra, India
Full-Time
On-site
Posted 5 months ago
•
Apply by May 4, 2026
Job Description
Job Title: Senior SOC Analyst (L3)
Location: Mumbai, India
Experience Required: 7+ Years
Employment Type: Full-Time
Job Summary:
NTT DATA is seeking an experienced
Senior SOC Analyst
to join our
Security Operations Center (SOC)
in Mumbai. The candidate will play a key role in detecting, analyzing, responding to, and preventing cybersecurity incidents across enterprise environments. The ideal professional will have strong technical, analytical, and communication skills with a deep understanding of threat landscapes, SIEM technologies, and incident response processes.
Key Responsibilities:
Perform
real-time security monitoring, analysis, and incident response
for enterprise systems, networks, and applications.
Investigate security alerts and correlate events using
SIEM tools
(e.g., Splunk, QRadar, ArcSight, Azure Sentinel).
Conduct
threat hunting, log analysis, and root cause investigations
for potential or actual incidents.
Manage the
incident response lifecycle
? triage, containment, eradication, recovery, and post-incident review.
Escalate incidents to higher levels (L3 or CSIRT) as per defined playbooks.
Develop and tune
correlation rules, dashboards, and detection use cases
.
Collaborate with IT, network, and application teams to mitigate vulnerabilities.
Generate
incident reports
, maintain SOC documentation, and contribute to process improvements.
Participate in
security assessments, vulnerability management, and threat intelligence integration
.
Mentor junior analysts (L1/L2) and help strengthen SOC operational maturity.
Required Skills and Qualifications:
Bachelor?s degree in Computer Science, Information Security, or related discipline.
7+ years
of total IT/security experience, with
minimum 4+ years in SOC operations
.
Proficient in
SIEM platforms
such as Splunk, IBM QRadar, ArcSight, or Azure Sentinel.
Strong understanding of
network protocols, firewalls, proxies, endpoint security, and malware analysis.
Expertise in
incident response, log analysis, and threat intelligence correlation.
Familiarity with
MITRE ATT&CK framework, NIST, and ISO 27001 standards.
Experience with
EDR tools
(CrowdStrike, Carbon Black, SentinelOne, etc.).
Knowledge of
Windows, Linux, and cloud security (AWS, Azure)
environments.
Excellent analytical thinking, documentation, and communication skills.
Preferred / Good to Have:
Certifications:
CEH, CHFI, CompTIA Security+, GCIA, GCIH, or Splunk Certified Analyst.
Experience in
security automation (SOAR)
and
playbook development
.
Exposure to
threat hunting, forensic analysis, and purple team activities.
Required Skills
Quick Tip
Customize your resume and cover letter to highlight relevant skills for this position to increase your chances of getting hired.
Related Similar Jobs
View All
Private Markets Analytics Product – Private Markets Performance, Associate
BlackRock
India
Full-Time
Communication
Product Development
Engineering
+46
Digital Forensic Investigator
Chevron
India
Full-Time
Python
Android
PowerShell
+6
Cloud Engineer
Infinity Quest
Engineering
Python
Kubernetes
+8
Junior Software Engineer - India (Remote)
MixRank
India
Full-Time
Git
JavaScript
Jira
+7
Data Base Engineer
Zensar Technologies
India
Full-Time
MySQL
PostgreSQL
SQL Server
+5
Share
Quick Apply
Upload your resume to apply for this position