Associate III - Cloud Infrastructure Services

UST

  • Pune, Maharashtra Thiruvananthapuram, Kerala
  • Permanent
  • Full-time
  • 19 days ago
Job Description:We are looking for a proactive and technically skilled SOC Level 2 Analyst to strengthen our Security Operations capabilities. As a key escalation point from L1, you will analyze, investigate, and escalate security s and events, working closely with threat intelligence and incident response teams.Your mission: minimize dwell time, validate and enrich s, and contribute to continuous improvement of our detection and response strategies.Key Responsibilities:
  • Review and investigate escalated security events from SOC L1 analysts using SIEM, EDR, NDR, and other monitoring tools.
  • Perform initial triage and validation of s, classify incidents, and escalate as needed to Incident Response or Threat Hunting teams.
  • Leverage threat intelligence to contextualize s and correlate multiple sources of evidence. • Analyze suspicious activity across endpoints, networks, email, and cloud environments. • Document investigation steps, findings, and recommendations accurately and clearly. • Maintain and improve playbooks, runbooks, and standard operating procedures.
  • Participate in purple team exercises, tabletop simulations, and detection engineering feedback loops.
  • Collaborate with L1 analysts by providing guidance and training on detection logic and triage techniques.
Required Qualifications:
  • 3+ years of experience in a SOC, security monitoring, or cybersecurity operations role.
  • Strong familiarity with security technologies such as SIEM (e.g., Splunk, QRadar, Sentinel), EDR (e.g., CrowdStrike, Defender for Endpoint), firewall logs, proxy logs.
  • Good understanding of common TTPs and attack models (MITRE ATT&CK, Cyber Kill Chain).
  • Hands-on experience performing triage, threat classification, and incident escalation.
  • Ability to write concise and accurate incident documentation and reports. • Working knowledge of Windows and Linux operating systems from a security perspective. Desired Qualifications:
  • Familiarity with detection logic tuning, rule creation, and threat hunting principles.
  • Experience with phishing investigations, malware sandboxing, and basic memory/network forensics. •
Exposure to scripting (Python, Bash, PowerShell) to automate tasks and parse data.
  • Knowledge of cloud security monitoring (Azure, AWS, Google Cloud).
  • Certifications such as: Security+, CySA+, GCFE, GCIH, SC-200, or equivalent.
What We Offer:
  • Work with skilled cybersecurity professionals in a collaborative SOC/IR environment.
  • Structured career growth path to IR, Threat Hunting, or Detection Engineering.
  • Access to paid certifications, tools, and labs.
Skills:Crowdstrike,IBM - Qradar,XSOARAbout Company:UST is a global digital transformation solutions provider. For more than 20 years, UST has worked side by side with the world’s best companies to make a real impact through transformation. Powered by technology, inspired by people and led by purpose, UST partners with their clients from design to operation. With deep domain expertise and a future-proof philosophy, UST embeds innovation and agility into their clients’ organizations. With over 30,000 employees in 30 countries, UST builds for boundless impact—touching billions of lives in the process.

UST