Triage, investigate, and analyze security alerts escalated from L1 analysts.Perform in-depth analysis of logs, alerts, and network traffic using SIEM tools (e.g., Splunk, QRadar, ArcSight).
Conduct root cause analysis of security incidents and recommend containment/remediation actions.Respond to medium and high-severity incidents and escalate critical incidents to L3 or IR teams.Assist in threat hunting using IOCs, anomaly detection, and behavioral patterns.
Develop and update incident response playbooks and standard operating procedures.Support use case development and tuning of correlation rules in SIEM.Collaborate with vulnerability management and threat intelligence teams to improve detection capabilities.
Maintain detailed documentation of investigations, findings, and response actions.

Keyskills: aml root cause analysis kyc splunk digital transformation risk management cdd screening due diligence anti money laundering edd transaction analysis investment banking cip client onboarding quality assurance due diligence review lexis nexis