Your browser does not support javascript! Please enable it, otherwise web will not work for you.

SOC L3 Analyst @ Clover Infotech

Home > IT Security

 SOC L3 Analyst

Job Description


Job Summary:
We are seeking a highly experienced SOC L3 Analyst to strengthen our Security Operations Center. The ideal candidate will have advanced expertise in monitoring, analyzing, and mitigating cybersecurity threats, as well as managing security tools and mentoring junior analysts. This role involves proactive threat hunting, incident response, and collaboration with cross-functional teams to enhance the organization s security posture.
Key Responsibilities:
  • Perform advanced monitoring, analysis, and triage of security events using tools like Zscaler, CrowdStrike, SentinelOne, and Symantec PGP.
  • Correlate threat data from multiple sources to identify and assess potential security threats.
  • Lead incident response efforts, including containment, eradication, and recovery of complex security incidents.
  • Conduct root cause analysis and recommend measures to prevent recurrence of incidents.
  • Generate detailed and actionable incident reports for stakeholders.
  • Conduct proactive threat-hunting activities using tools such as CrowdStrike Threat Graph, SentinelOne s deep visibility, and Zscaler logs.
  • Manage and optimize security tools to align with organizational security policies.
  • Deploy and fine-tune Zscaler cloud security solutions and EDR tools like CrowdStrike and SentinelOne.
  • Maintain encryption policies and ensure secure data handling with Symantec PGP.
  • Mentor L1 and L2 analysts, providing training in advanced threat detection and incident response.
  • Collaborate with IT, DevOps, and Compliance teams to improve the organization s overall security posture.
Qualifications:
  • Minimum of 09 years in a SOC environment, with at least 2 years as an L3 Analyst.
  • Expertise in Zscaler (Cloud Security), CrowdStrike Falcon (EDR), SentinelOne (Endpoint Protection), and Symantec PGP (Encryption).
  • Proficiency in scripting languages such as Python and PowerShell for automation.
  • In-depth knowledge of the MITRE ATTCK Framework and TTPs (Tactics, Techniques, and Procedures).
  • Strong analytical and problem-solving skills.
  • Excellent communication skills for creating reports and explaining technical issues to non-technical stakeholders.
  • Certified Incident Handler (GCIH).
  • Certified Information Systems Security Professional (CISSP).
  • Certified Ethical Hacker (CEH).
  • Vendor-specific certifications such as Zscaler Certified Administrator (ZCCA), CrowdStrike Certified Professional, or SentinelOne Certified Specialist.

Job Classification

Industry: IT Services & Consulting
Functional Area / Department: IT & Information Security
Role Category: IT Security
Role: Security Engineer / Analyst
Employement Type: Full time

Contact Details:

Company: Clover Infotech
Location(s): Noida, Gurugram

+ View Contactajax loader


Keyskills:   Symantec SAN Automation French cloud security Analytical SOC Security operations Monitoring Python

 Job seems aged, it may have been expired!
 Fraud Alert to job seekers!

₹ Not Disclosed

Similar positions

Security Analyst

  • TEKsystems
  • 7 - 12 years
  • Hyderabad
  • 26 days ago
₹ 22.5-27.5 Lacs P.A.

SOC Lead

  • Kyndryl
  • 3 - 6 years
  • Noida, Gurugram
  • 29 days ago
₹ Not Disclosed

Technology Associate SOC ( Qradar Admin)

  • SHI
  • 2 - 5 years
  • Hyderabad
  • 30 days ago
₹ Not Disclosed

Associate Information Security Analyst

  • NTT DATA
  • 0 - 2 years
  • Mumbai
  • 30 days ago
₹ Not Disclosed

Clover Infotech

Clover Infotech is a leading IT services and consulting company. We are a strategic partner to the worlds leading technology OEMs such as Oracle (Platinum partner), Microsoft (Gold partner) and IBM. We provide solutions and services across application and technology modernization, cloud enablement...