Skip to Main Content

Job Title


L3 Security Operations Center Analyst


Company : Aimhire


Location : Gurugram, Uttar pradesh


Created : 2025-05-15


Job Type : Full Time


Job Description

Do you want to work with a team of the world’s top supply chain & logistics experts with a laser focus on helping organizations scale up their business profitability ? At Aimhire.io we are the exclusive recruiting partner to our client and we are hiring urgently.We are seeking a highly experienced SOC L3 Analyst to strengthen our Security Operations Center. The ideal candidate will have advanced expertise in monitoring, analyzing, and mitigating cybersecurity threats, as well as managing security tools and mentoring junior analysts. This role involves proactive threat hunting, incident response, and collaboration with cross-functional teams to enhance the organization’s security posture.Required Competences:Extensive experience of supporting and configuring Endpoint detection and response (EDR) tools.Extensive experience of supporting and configuring Security information and event management (SIEM) tools.Extensive experience of supporting and configuring Security Orchestration, Automation and Response (SOAR) tools.Knowledge about various tools like – SIEM, SSL, Packet Analysis, HIPS/NIPS, Network Monitoring tools, ITHD Ticketing Toolset Web Security, AV, UBEA, Advanced SOC.Knowledge of various operating system flavors including but not limited to Windows, Linux, UnixVulnerability Scanning and reporting. Prioritizing and tracking remediation of vulnerabilities. Creating / modifying firewall configurations and policies.Extensive experience of packet-capture tools and analysis of packet flows preferred.Extensive experience of security assessment and penetration testing tools preferred.Extensive experience of network-based User Behavior Analytics preferredExtensive Knowledge of Threat Intelligence Services required.Ability to provide relevant and timely information to executive leaders based on analysis of events from a SIEM and EDR platforms.Be a thought leader in the SOC. Customer-facing, with good report-writing skills and strong communication skills at all levels.Ability to consistently deliver to deadlines while prioritizing competing demands for time, without sacrificing quality. Professional, hard-working and have the ability to pay attention to detail.Good understanding of ITIL processes, including Change Management, Incident Management and Problem Management.Concept of SOC, Experience in Cyber Security domain, SIEM (Azure Sentinel)Threat intelligence concepts, (Azure Sentinel)Threat modelling & Data modellingSolid understand of enterprise log management and complex log correlation practices as well as alerting systemSIEM content development - Use case configuration and logs parsing experienceCollaborate with IT, DevOps, and Compliance teams to improve the organization’s overall security postureAble to meet demands for occasional out-of-hours working and on-call escalationEducation/Qualifications:B.E degree or equivalent experience in Computing.Minimum of 07 years in a SOC environment, with at least 4 years as an L3 Analyst.Proficiency in scripting languages such as Python and PowerShell for automation.In-depth knowledge of the MITRE ATT&CK Framework and TTPs (Tactics, Techniques, and Procedures).Strong analytical and problem-solving skills.Excellent communication skills for creating reports and explaining technical issues to non-technical stakeholders.Certified Incident Handler (GCIH).Certified Information Systems Security Professional (CISSP).