VLink Inc. is a global software engineering and IT staffing partner, delivering innovative solutions with the most highly vetted expert software development teams. We leverage the latest technologies and the best IT talent to drive business growth for Fortune-500, Large and SMB clients by delivering a customized, personal approach, to ensure their unique technology needs are met. Founded in 2006, VLink takes pride in our highly revered workforce whose productivity, tech agility, and expertise produce transformative customer success stories year-after-year.
Job Role: SOC Analyst L3
Requirements:
The investigation and response to advanced persistent threats (APTs) and complex security incidents.
Develop and manage security use cases, detection rules, and correlations within Azure Microsoft Sentinel or SentinelOne.
Provide strategic guidance and oversight to L1 and L2 analysts during major incidents and escalations.
Lead SOC shifts, ensuring proper coverage and incident management across 24x7 operations.
Ensure that the SOC team follows proper incident response protocols, escalation procedures, and security policies.
Collaborate with threat hunters to identify new attack patterns and improve detection capabilities.
Review and update the organization’s incident response plan, conducting
tabletop exercises and post-incident reviews.
Conduct threat intelligence research, share insights, and integrate threat intel into operational security processes.
Provide subject matter expertise on incident response, forensic analysis, and threat hunting.
Assist in the management and optimization of SIEM tools, ensuring maximum efficiency and effectiveness.
Work closely with clients and stakeholders to provide incident analysis, reports, and security recommendations.
Generate regular reports on SOC performance, incident trends, and lessons learned.
Lead, mentor, and train L1 and L2 analysts, enhancing team capabilities and expertise
Ensure shift documentation is properly maintained, and incidents are tracked and reported using Jira/Manage Engine ITSM.
Job Descriptions:
The SOC L3 Analyst is a senior-level position responsible for handling the most complex security incidents and providing strategic direction for the SOC team. This role involves leading shifts, mentoring junior analysts, and providing strategic oversight to ensure effective detection, analysis, and response to security incidents. The L3 Analyst will leverage expertise in threat intelligence, use case management, and advanced incident response while ensuring all security measures and processes are efficiently implemented across the organization.