Security Advisor
Summary: As a Level 1.5 SOC Analyst, your role involves deeper investigation of security alerts and confirmed incidents. You will validate escalated events using Sentinal One and Splunk SIEM, enrich them with context, and work closely with L3 analysts to assist in containment and timely remediation.
You will also assist in improving detection fidelity and supporting SOAR automation. This role requires deep expertise in detection, investigation, containment, and remediation, as well as collaboration with multiple teams across security, IT, and compliance. Roles & Responsibilities:
- Investigate alerts escalated by L1 to determine scope, impact, and root cause
- Perform in-depth endpoint and network triage using Sentinel
One
- Use Sentinel
One to perform endpoint analysis and threat validation
- Correlate multiple log sources in Splunk to trace attacker activity
- Enrich events with asset, identity, and threat intelligence context
- Document investigation workflows, evidence, and final conclusions
- Support L2 during major incidents by performing log or memory triage
- Suggest improvements in alert logic & fine tunning.
- Conduct threat research aligned to alert patterns and business context
- Enhance alert fidelity with threat intel and historical context
- Document investigation findings and communicate with stakeholders
Professional & Technical Skills:
- Alert Triage & Monitoring: Experience investigating escalated alerts using SIEM or EDR
- Incident Response and Containment: Take necessary actions to contain, eradicate and recover from security incidents.
- Identify opportunities for automation and work with SIEM Platform Support team for implementing it.
- EDR Deep Dive: Using Real Time Response (RTR), Threat Graph, custom IOA rules
- Proficiency in writing SPL queries, dashboards and providing fine tuning opportunities
- Threat Hunting: Behavior-based detection using TTPs
- Good understanding of malware, lateral movement, privilege escalation, and exfiltration patterns
- Threat Intel Integration: Automation of IOC lookups and enrichment flows
- Forensic Skills: Live host forensics, log correlation, malware behavioral analysis
- Good experience in advanced threat detection and incident response
- Proficiency in Sentinal
One forensic and incident response capabilities
- Playbook Development/Updation: Able to define, update, and optimize IR playbooks and workflows
- Forensic analysis (memory, file systems, logs)
- Cloud incident handling (AWS, Azure)
- Dashboarding: Advanced visualizations and business-focused metrics in Splunk
- Certifications: Splunk Certified Admin/ES Admin, SC-200, Sentinal
One EDR vendor training
- Sentinal
One: Custom detections, forensic triage, threat graphs
- Splunk SIEM (core + ES module): Searching Logs, Monitoring and investigating alerts.
Additional Information:
- The candidate should have minimum 2+ years in SOC/IR .
- Experience in 24x7 environments, shift-based operations, or critical infrastructure response
- This position is based at our Hyderabad office.
- A 15 years full time education is required.
- Bachelors in IT/Cybersecurity + advanced certifications (CISSP), Splunk Certified Admin/ES admin, EDR Certification (like Sentinal
One) etc.
Information :
- Company : Accenture India
- Position : Security Advisor
- Location : Hyderābād, Telangana
- Country : IN
Attention - In the recruitment process, legitimate companies never withdraw fees from candidates. If there are companies that attract interview fees, tests, ticket reservations, etc. it is better to avoid it because there are indications of fraud. If you see something suspicious please contact us: support@jobkos.com
Post Date : 2025-07-31 | Expired Date : 2025-08-30