Senior Security Operations Center (SOC) Analyst with SIEM and Endpoint Security Expertise
LTIMindtree is seeking an experienced L2 SOC Analyst to monitor, investigate, and respond to cybersecurity events globally. The role involves advanced monitoring with tools like Splunk, Cortex, and Crowdstrike, mentoring L1 analysts, and collaborating with IT teams. This remote position supports a 24/7 operational environment to enhance security posture and incident response capabilities.
Key Highlights
Technical Skills Required
Benefits & Perks
Job Description
About Us:
LTIMindtree is a global technology consulting and digital solutions company that enables enterprises across industries to reimagine business models, accelerate innovation, and maximize growth by harnessing digital technologies. As a digital transformation partner to more than 700+ clients, LTIMindtree brings extensive domain and technology expertise to help drive superior competitive differentiation, customer experiences, and business outcomes in a converging world. Powered by nearly 90,000 talented and entrepreneurial professionals across more than 30 countries, LTIMindtree — a Larsen & Toubro Group company — combines the industry-acclaimed strengths of erstwhile Larsen and Toubro Infotech and Mindtree in solving the most complex business challenges and delivering transformation at scale. For more information, please visit www.ltimindtree.com
Job Title: Senior SOC Analyst with Splunk, Cortex and Crowdstrike
Work Location: Remote
Job Description
We are seeking a skilled and experienced L2 SOC Analyst to join our global Security Operations Center. The ideal candidate will bring strong expertise in security monitoring, investigation, correlation, and incident response, with hands-on experience using technologies such as Splunk, Cortex, Crowdstrike. This role requires solid analytical skills, technical depth, and the ability to guide L1 analysts while collaborating across distributed teams.
Key Responsibilities
- Conduct advanced monitoring, detection, investigation, and analysis of cybersecurity events using Splunk and other SIEM tools.
- Perform security event correlation for alerts escalated from L1 SOC or other monitoring sources to determine potential impact or increased risk to the business.
- Identify potential, successful, or attempted intrusion activities through detailed log review, event analysis, and threat pattern recognition.
- Execute and improve SOC procedures, ensuring consistent and effective incident handling.
- Mentor, coach, and provide technical guidance to L1 SOC analysts.
- Triage and prioritize security events, detect anomalies, and recommend or coordinate remediation actions.
- Propose threat mitigation strategies and contribute to continuous improvement of SOC capabilities.
- Refine existing SIEM use cases and develop new detection logic based on evolving threats or business requirements.
- Ensure confidentiality and protection of sensitive information during all monitoring and investigative activities.
- Collaborate with IT Infrastructure & Operations teams to support event mitigation and incident response efforts.
- Prepare reports, dashboards, and visualizations to communicate incident insights and trends.
- Work effectively within a global, distributed team environment and support a 24x7 rotation as required.
Required Qualifications
- 3–5 years of experience in security monitoring, alert analysis, incident management, or SOC operations.
- Strong background in alert monitoring, event correlation, and advanced analysis.
- Hands-on experience with Splunk (primary SIEM) and familiarity with other SIEM solutions.
- Understanding of alerts and events from security tools such as DLP, WAF, EDR, malware detection systems, and email security/phishing platforms.
- Experience in performing Root Cause Analysis (RCA) using SIEM data.
- Working knowledge of SOC and incident response processes and methodologies.
- Relevant security certification such as CEH, CompTIA Security+, or equivalent.
Preferred Skills
- Strong analytical and problem-solving abilities.
- Experience with tools including Splunk, Cortex, CrowdStrike, Proofpoint, Cisco Stealthwatch, and similar technologies.
- Familiarity with malware analysis and phishing email investigations.
- Strong communication skills and customer-oriented mindset.
- Knowledge of C++, Python, and Regex for advanced analysis or automation.
Benefits/perks listed below may vary depending on the nature of your employment with LTIMindtree (“LTIM”):
Benefits and Perks:
- Comprehensive Medical Plan Covering Medical, Dental, Vision
- Short Term and Long-Term Disability Coverage
- 401(k) Plan with Company match
- Life Insurance
- Vacation Time, Sick Leave, Paid Holidays
- Paid Paternity and Maternity Leave
The range displayed on each job posting reflects the minimum and maximum salary target for the position across all US locations. Within the range, individual pay is determined by work location and job level and additional factors including job-related skills, experience, and relevant education or training. Depending on the position offered, other forms of compensation may be provided as part of overall compensation like an annual performance-based bonus, sales incentive pay and other forms of bonus or variable compensation.
Disclaimer: The compensation and benefits information provided herein is accurate as of the date of this posting.
LTIMindtree is an equal opportunity employer that is committed to diversity in the workplace. Our employment decisions are made without regard to race, colour, creed, religion, sex (including pregnancy, childbirth or related medical conditions), gender identity or expression, national origin, ancestry, age, family-care status, veteran status, marital status, civil union status, domestic partnership status, military service, handicap or disability or history of handicap or disability, genetic information, atypical hereditary cellular or blood trait, union affiliation, affectional or sexual orientation or preference, or any other characteristic protected by applicable federal, state, or local law, except where such considerations are bona fide occupational qualifications permitted by law.
Safe return to office: In order to comply with LTIMindtree’ s company COVID-19 vaccine mandate, candidates must be able to provide proof of full vaccination against COVID-19 before or by the date of hire. Alternatively, one may submit a request for reasonable accommodation from LTIMindtree’s COVID-19 vaccination mandate for approval, in accordance with applicable state and federal law, by the date of hire. Any request is subject to review through LTIMindtree’s applicable processes.