Skip to Main Content

Job Title


Cyber Security Analyst


Company : Tata Consultancy Services


Location : New delhi, Delhi


Created : 2026-03-29


Job Type : Full Time


Job Description

Company : TCSSkill : Threat HuntingExperience Range : 6 to 15 YearsLocation : Chennai & HyderabadInterview Mode : Face to Face (Walkin)Note : Pls apply only if available for the face to face interview on 4th April 2026 (Saturday)Job Description :Proactive Threat HuntingConduct hypothesis-driven and data-driven threat hunting across endpoints, networks, cloud, and identity systems.Identify anomalous behaviors, TTPs, and indicators of compromise using MITRE ATT&CK and threat intel sources.Perform deep-dive investigation into suspicious activities, lateral movement, privilege escalation, and persistence techniques.Analysis & Detection EngineeringAnalyze logs, telemetry, and events from SIEM, EDR, XDR, NDR, Firewall, and Cloud security tools.Develop new detection rules, signatures, and behavioral analytics to improve SOC detection capabilities.Validate, tune, and optimize detection logic to reduce false positives.Threat Intelligence IntegrationConsume threat intel reports, IOCs, malware analysis feeds, and emerging threat trends.Translate threat intel into actionable hunting queries, playbooks, and detection rules.Track APT groups, campaigns, and emerging vulnerabilities (CVEs).Incident Response SupportCollaborate with SOC Analysts and Incident Response teams during investigations.Provide recommendations for containment, remediation, and hardening.Perform root-cause analysis on identified threats.Reporting & DocumentationPrepare detailed hunt reports, findings, and risk insights for leadership.Document new hunting methodologies, playbooks, and detection logic.Required Skills and QualificationsExperience in Threat Hunting, SOC, Incident Response, or Cyber Defense.Strong understanding of:MITRE ATT&CK FrameworkWindows/Linux internalsNetwork protocols (TCP/IP, DNS, HTTP, etc.)Cloud platforms (AWS, Azure, GCP)Hands-on experience with SIEM/EDR/XDR tools such as:Splunk, Sentinel, QRadar, ELKCrowdStrike, Defender ATP, Tanium, Carbon Black, Palo Alto CortexAbility to write complex queries using:KQL, SQL, SPL, YARA, Sigma rulesExperience analyzing malicious files, scripts, and techniques used by APT groups.Strong analytical, investigative, and problemsolving skills.