SOC L2/L3

Full–time

Posted on: a day ago

Greetings from TCS!!!

Role: SOC L2/L3

Experience: 6 to 15 years

Location: Hyderabad/Chennai/Bangalore
  • Drive date: 21-March-2026 *

  • Mode of interview: Walkin

    Job Description:
  • Proactively search for threats that may not trigger alerts, utilizing threat intelligence and advanced analytical skills.
  • Lead and coordinate responses to critical security incidents, including containment, eradication, and recovery.
  • Create and refine detection rules and security use cases for SIEM and other security tools.
  • Correlate data from threat intelligence feeds and other sources to identify emerging threats and vulnerabilities.
  • Investigate complex security incidents to determine the root cause and prevent future occurrences.
  • Maintain accurate and detailed records of incidents, investigations, and remediation steps.
  • Work with other teams, such as engineering and IT, to improve security posture and implement necessary changes.
  • Effectively communicate with stakeholders, including technical and non-technical personnel, about security incidents and status.
  • Able to connect any type of logs and from any type of source to Sentinel Log Analytic workspace.
  • Should have hands on experience in creating playbook, analytic rule, workbooks, notebooks for incident Threat hunting.
  • Develop and automate incident response capability
  • If asked for, build custom detection rules on Defender based on ad hoc requests by client
  • Guide and train L1 and L2 analysts, sharing knowledge and expertise to improve the team's overall capabilities.
  • Experience in Sentinel SIEM tool, Fine tuning of Rules.
  • Knowledge of different Microsoft Defender products. Implementation and integration of defender for cloud services.
  • Automation Rule creation along with creation of Playbooks, Workbooks.
  • Leadership & Team management skills during their approved shifts.
  • Experience in cloud computing and cloud security role.
  • Experience in Azure security role.
  • Experience in automation in SOC area.
  • Minimum 5 years of experience in Microsoft Sentinel and Azure log analytics and developing Kusto Query Language Experience in SIEM and SOAR implementation.
  • Should have experience in developing KQL queries for data normalization and parsing capability for Log Analytics data ingestion pipeline.
  • Highly proficient in Microsoft Sentinel and Azure Log Analytics.

Thanks & Regards

Sindhuja Polisetty

HR TAG – Cyber Security

Tata Consultancy Services