Senior Security Engineer – SOC
Relevant Experience: 4 – 6 years
Senior Security Analyst-SOC Experience: 4-6 Years Location: Bangalore Role: Senior Analyst SOC Role Description: We are seeking an experienced Senior Analyst for our Security Operations Center (SOC) who will be responsible for managing and optimizing SIEM operations using SIEM, conducting attack surface monitoring through third-party attack surface management, and supporting cyber insurance risk assessment and tracking. This role requires deep expertise in security monitoring, threat detection, and risk quantification to protect organizational assets and maintain cyber insurance We seek a proactive and detail-oriented security professional with strong analytical skills, experience in threat intelligence, and proficiency with modern security operations tools. The ideal candidate will demonstrate expertise in security event correlation, incident investigation, and risk assessment methodologies.
Job Description
- Monitor and analyze security events and alerts in real-time using SIEM platform, identifying patterns and potential threats across the enterprise infrastructure.
- Investigate security incidents, conduct root cause analysis, and provide detailed incident reports with remediation recommendations.
- Configure, tune, and optimize SIEM rules, dashboards, and alerts to improve detection accuracy and reduce false positives. Use an attack surface management platform to identify external vulnerabilities, exposed assets, and emerging threats targeting the organization.
- Track and report on attack surface findings including exposure of credentials, data leaks, domain takeovers, and other attack surface risks.
- Support cyber insurance risk assessment and tracking by providing security posture metrics, vulnerability reports, and compliance status.
- Develop and maintain cyber insurance risk dashboards showing organizational security metrics and insurance-relevant KPIs.
- Coordinate with the incident response team to manage critical security incidents and coordinate remediation efforts.
- Maintain documentation of security procedures, incident timelines, and lessons learned for continuous improvement.
- Prepare security reports and metrics for management and insurance providers regarding security posture and risk levels. Critical
Skills/ Competencies
- Lead on compliance reviews, certifications and accreditations (e.g. ISO27001, SOC2, GDPR etc.)
- Enhance risk and compliance strategy in alignment with internal controls, audit and business requirements and objectives.
- Review, assess and document current internal controls.
- Translate legal and regulatory requirements into a unified collection of processes and provide the respective stakeholders with compliance requirements and methodologies.
- Facilitate Client assessments.
- Collaborate with engineering, product and cloud teams to ensure security compliance and continually improve processes.
- Facilitate internal & external audits and conduct reviews to verify compliance.
- Manage all internal and external audit findings and ensure their remediation on an agreed schedule with the respective stakeholders.
- Collaborate with the privacy team and the data management team on implementation of global policies.
- Managing security incidents and taking appropriate corrective actions.
- Define risk and compliance metrics and provide monthly reporting to management, including gaps in policy and proposed resolutions.
- Maintain a risk register and manage risk mitigation plans.
- Frequently update domain knowledge by tracking incoming regulations, maintaining knowledge of relevant frameworks and standards; participating in educational opportunities; reading professional publications; maintaining personal networks; participating in professional organizations and obtaining relevant certifications.
- Conduct trainings on information security awareness for new joiners. ● Expert-level proficiency with SIEM platform including installation, configuration, rule development, and alert optimization.
- Hands-on experience with attack surface management platform and threat intelligence feeds.
- Strong understanding of security event correlation, threat detection techniques, and incident investigation methodologies.
- Knowledge of cyber insurance requirements, compliance standards (ISO 27001, SOC 2, NIST), and risk quantification methodologies.
- Proficiency in SIEM rule writing, query languages, and log analysis (JSON, SQL, regular expressions).
- Understanding of network security, endpoint security, and cloud security monitoring concepts.
- Ability to create dashboards and reports for security metrics and KPIs.
- Strong analytical and problem-solving skills with attention to detail.
- Excellent written and verbal communication skills for reporting to stakeholders.
- Experience with incident response procedures and coordination with response teams.
- Familiarity with threat intelligence sources and vulnerability databases.
- Knowledge of web application security, API security, and common attack vectors. In addition, preference will be given to candidates who possess any of the following certifications:
- GIAC Security Essentials (GSEC) or Certified Incident Handler (GCIH)
- CompTIA Security+ or CEH (Certified Ethical Hacker)
- SIEM platform certification or hands-on experience
- SANS certifications in log analysis, incident handling, or security management
- SIEM-specific training or certifications
- Threat Intelligence Platform (TIP) certifications or hands-on experience