ZS

Senior Security Operations Analyst

Zscaler Softech
Pune3-13 LPA Posted 18 Jun 2025
FULL TIME
Siem
Incident Response
Threat Hunting
Cloud Security

Job Description

  • Manage the day-to-day operations of Microsoft Sentinel, including rule creation, log ingestion, data analytics, and alert triaging
  • Develop and tune detection rules, use cases, and analytics within Sentinel to improve threat visibility and detection capabilities
  • Leverage Wiz Defend to detect and respond to runtime threats across cloud workloads and Kubernetes environments in real-time
  • Continuously monitor and investigate alerts generated by Wiz Defend to enhance threat detection, triage, and incident response capabilities
  • Perform proactive threat hunting to identify and mitigate advanced threats
  • Conduct in-depth incident investigations and coordinate response efforts to ensure swift remediation
  • Collaborate with internal stakeholders and the Threat Intelligence team to identify and mitigate potential security threats
  • Generate reports and dashboards to communicate SOC performance metrics and security posture to leadership
  • Continuously improve SOC processes and playbooks to streamline operations and response efforts
  • Mentor junior SOC analysts and provide guidance on security best practices
  • This role requires participation in a rotational shift

Flexibility and availability to respond to urgent incidents outside of assigned shifts, as needed

 

What you'll bring:

  • Strong analytical and problem-solving abilities
  • Excellent communication and interpersonal skills to effectively collaborate with cross-functional teams
  • Proven ability to remain calm and efficient under a high-pressure environment
  • Proficient in using SIEM tools, such as Microsoft Sentinel
  • Experience with data migration strategies across SIEM platforms
  • Experience on Cloud Security Operations and Incident Response platforms such as Wiz
  • In-depth understanding of cyber threats, vulnerabilities, and attack vectors
  • Proficient in creating KQL queries and custom alerts within Microsoft Sentinel
  • Expertise in developing SIEM use cases and detection rules
  • Skilled in incident response and management procedures
  • Experienced in conducting deep-dive investigations and root cause analysis for incidents
  • Adept at collaborating with stakeholders to resolve complex cybersecurity challenges
  • Ability to automate routine SOC processes to enhance operational efficiency
  • Experienced in mentoring and guiding junior analysts in security operations
  • Knowledge of major cloud platforms (AWS, Azure, GCP), including their security models, IAM roles, virtual private cloud (VPC) configurations, and cloud-native security tools

 

Good to have skills and abilities:

  • Excellent interpersonal (self-motivational, organizational, personal project management) skills
  • Knowledge of vulnerability management and scanning best practices such as CVE database and the CVS System
  • Ability to analyze cyber threats to develop actionable intelligence
  • Skill in using data visualization tools to convey complex security information

 

Academic Qualifications:

  • Bachelors degree in Cybersecurity, Information Technology, Computer Science, or a related field (or equivalent experience)
  • 4+ years of experience in a Security Operations Center (SOC) environment, with a focus on SIEM management
  • Strong hands-on experience with Microsoft Sentinel, including data connectors, KQL queries, analytics rules, and workbooks
  • Experience with SIEM migration
  • Expertise in incident response, threat detection, and security monitoring
  • Solid understanding of Windows, Linux, and cloud security concepts
  • Relevant certifications (eg, CompTIA Security+, Microsoft Certified: Security Operations Analyst, GCIA, GCIH, OSDA, GCFA) are preferred
  • Preferred Security Cloud Certifications: AWS Security Specialty