Your browser does not support javascript! Please enable it, otherwise web will not work for you.

Deputy Manager -IT Security Operations(only SOC) @ CorroHealth

Home > IT Security

CorroHealth  Deputy Manager -IT Security Operations(only SOC)

Job Description

Roles and Responsibilities:

  • Manage IT operations for high availability, scalability, and security.
  • Strong background in IT Infra is good. However, L3 level expertise in Security Ops is a must
  • Oversee incident response efforts to quickly identify and mitigate threats using SIEM and CrowdStrike.
  • Collaborate with cross-functional teams to implement L3 support processes for critical applications.
  • Develop and maintain documentation for IT procedures, policies, and standards.
  • Ensure compliance with industry standards and best practices.
  • Provide technical guidance and support to junior team members.

Job Requirements:

  • Overall, 10 years of total experience, with 78 years of specialized expertise in Cybersecurity.
  • Minimum 5 years of hands-on experience in a Security Operations Center (SOC) environment.

Core Responsibilities (L3 Level):

  • Lead complex security incident investigations and provide expert-level forensics and technical analysis.
  • Perform end to end incident management, including containment, eradication, recovery, and root-cause analysis.
  • Act as a senior escalation point for L1/L2 analysts and guide them through complex investigations.
  • Conduct proactive, intelligence-driven threat hunting to identify advanced and stealthy threats.
  • Analyse multi-source security logs, correlate events, and detect sophisticated attack patterns.
  • Investigate zero-day vulnerabilities, newly reported CVEs, and emerging cyber threats.
  • SOC Operations & Enhancement
  • Develop, refine, and maintain detection use cases, correlation rules, event logic, and alert thresholds.
  • Provide SIEM & SOAR tuning and optimization to reduce false positives and improve detection fidelity.
  • Enhance automation workflows within SOAR platforms to improve incident response efficiency.
  • Maintain and continuously improve SOC playbooks, SOPs, and response templates.
  • Drive improvements across SOC processes, SLAs, shift workflows, and operational maturity.
  • Lead continuous improvement initiatives, focusing on detection gaps, tuning feedback loops, and new log onboarding.

Implementation & Projects

  • Lead technical implementation and onboarding of new security tools, log sources, and integrations.
  • Coordinate with platform teams to deploy, configure, and validate new security technologies.
  • Oversee SIEM architecture enhancements, parser development, log ingestion, and normalization.
  • Participate in deployment of EDR, UEBA, SOAR, Threat Intel, Network Security and other security platforms.
  • Ensure successful end-to-end implementation: requirement gathering configuration testing go live.
  • Drive continuous platform upgrades, configuration finetuning, and operational improvements.

Technical Expertise

  • Strong understanding of cyberattacks, threat vectors, MITRE ATT&CK techniques, malware               behaviour, and incident response frameworks.
  • Expertise across Windows, Linux, and Unix environments.
  • Strong knowledge of TCP/IP, DNS, DHCP, routing, packet analysis, and network security architecture.
  • Hands-on experience with: 
  • SIEM (Splunk, CrowdStrike etc.)
  • IDS/IPS, UEBA, EDR, SSL inspection, Packet analysis tools
  • CrowdStrike Falcon (deep experience in policies, detection tuning, RTR, investigation)
  • SOAR platforms (automation playbooks, workflow creation, integration)
  • Ticketing systems such as JIRA, ServiceNow
  • Strong expertise in Vulnerability Management, VAPT, and scanning activities (tools and remediation workflows).

Leadership & Collaboration:

  • Mentor, guide, and train L1 and L2 analysts on incident handling, detection techniques, and SOC maturity.
  • Collaborate with cross-functional teams (Infra, IT, Cloud, Network, Risk, Application teams).
  • Provide technical recommendations for remediation, risk reduction, and improved security posture.
  • Create and deliver clear, actionable incident reports, executive summaries, and technical documentation.

Additional Responsibilities

  • Monitor, assess, and respond to high severity alerts in a 247 SOC environment.
  • Perform ongoing threat analysis, vulnerability assessment, and incident trend analysis.
  • Participate in tabletop exercises, after-action reviews, and cyber readiness activities.
  • Handle and support any additional SOC responsibilities as assigned.

Job Classification

Industry: BPM / BPO
Functional Area / Department: IT & Information Security
Role Category: IT Security
Role: Security Engineer / Analyst
Employement Type: Full time

Contact Details:

Company: CorroHealth
Location(s): Chennai

+ View Contactajax loader


Keyskills:   Crowdstrike Siem Tools L3 Support SIEM

 Fraud Alert to job seekers!

₹ 10-14 Lacs P.A

Similar positions

Gen AI Security engineer

  • Capgemini
  • 5 - 7 years
  • Kolkata
  • 14 days ago
₹ Not Disclosed

Deputy IT Manager (SOC)

  • CorroHealth
  • 8 - 12 years
  • Chennai
  • 4 days ago
₹ 10-16 Lacs P.A.

Cloud Security Engineer

  • Tata Consultancy
  • 4 - 9 years
  • Hyderabad
  • 15 days ago
₹ Not Disclosed

Ind Systems And Infrastructure Engineer Iii, Information Security

  • Walmart
  • 2 - 3 years
  • Bengaluru
  • 23 days ago
₹ Not Disclosed

CorroHealth

SAP India is the fastest growing subsidiary of SAP SE, the worlds leading provider of business software solutions. SAP India began its operations in 1996 with headquarters in Bangalore and offices in Mumbai, New Delhi, Kolkata, and a direct presence in nine cities across India, besides having market...