Job Description
Greetings from TCS!!!
Role: SOC L2/L3
Experience: 6 to 15 years
Location: Hyderabad/Chennai/Bangalore
***Drive date: 21-March-2026***
Mode of interview: Walkin
Job Description:
Proactively search for threats that may not trigger alerts, utilizing threat intelligence and advanced analytical skills.
Lead and coordinate responses to critical security incidents, including containment, eradication, and recovery.
Create and refine detection rules and security use cases for SIEM and other security tools.
Correlate data from threat intelligence feeds and other sources to identify emerging threats and vulnerabilities.
Investigate complex security incidents to determine the root cause and prevent future occurrences.
Maintain accurate and detailed records of incidents, investigations, and remediation steps.
Work with other teams, such as engineering and IT, to improve security posture and implement necessary changes.
Effectively communicate with stakeholders, including technical and non-technical personnel, about security incidents and status.
Able to connect any type of logs and from any type of source to Sentinel Log Analytic workspace.
Should have hands on experience in creating playbook, analytic rule, workbooks, notebooks for incident Threat hunting.
Develop and automate incident response capability
If asked for, build custom detection rules on Defender based on ad hoc requests by client
Guide and train L1 and L2 analysts, sharing knowledge and expertise to improve the team's overall capabilities.
Experience in Sentinel SIEM tool, Fine tuning of Rules.
Knowledge of different Microsoft Defender products. Implementation and integration of defender for cloud services.
Automation Rule creation along with creation of Playbooks, Workbooks.
Leadership & Team management skills during their approved shifts.
Experience in cloud computing and cloud security role.
Experience in Azure security role.
Experience in automation in SOC area.
Minimum 5 years of experience in Microsoft Sentinel and Azure log analytics and developing Kusto Query Language Experience in SIEM and SOAR implementation.
Should have experience in developing KQL queries for data normalization and parsing capability for Log Analytics data ingestion pipeline.
Highly proficient in Microsoft Sentinel and Azure Log Analytics.
Thanks & Regards
Sindhuja Polisetty
HR TAG – Cyber Security
Tata Consultancy Services
Ready to Apply?
Don't miss this opportunity! Apply now and join our team.
Job Details
Posted Date:
March 15, 2026
Job Type:
Technology
Location:
Bangalore, India
Company:
Tata Consultancy Services
Ready to Apply?
Don't miss this opportunity! Apply now and join our team.