Job Description

  • Exp: 3+years
  • Location: Bangalore
  • send resumes to:


Job description:


SOC Detection and Automation engineer


sible for enhancing our security posture by developing, implementing, and maintaining detection

content within the SIEM. A key focus of this position will be leveraging our SIEMs automation

and AI capabilities to streamline level 1 security incident triage and response, thereby

increasing the efficiency and effectiveness of our Security Operations Center (SOC).

ResponsibilitiesWe are seeking a highly skilled and motivated SOC Engineer to

join our security operations team. This critical role will be respon

Detection Engineering and Content Development

● Design, develop, test, and deploy high-fidelity detection rules, correlational logic, and

behavioral models within SIEM.

● Translate threat intelligence, known vulnerabilities, and observed attack techniques

(e.g., MITRE ATT&CK framework) into actionable detection content.

● Continuously review and tune existing detection content to minimize false positives while

maximizing coverage of emerging threats.

● Ensure all detection content is mapped to relevant security controls and incident

response playbooks.

Automation and Efficiency

● Develop, implement, and maintain automation playbooks (using our SIEMs automation

engine) to automate repetitive Level 1 incident triage tasks, data enrichment, and initial

response actions.

● Integrate SIEM with other security tools and enterprise platforms via APIs and

connectors to facilitate seamless data flow and automated response.

● Explore and apply SIEMs built-in AI/ML capabilities to improve alert prioritization,

anomaly detection, and automated incident clustering.

● Document automation logic, workflows, and effectiveness metrics.

Platform Management and Optimization

● Act as a subject matter expert for the SIEM, including data ingestion, logging policies,

and platform health.

● Collaborate with Security Architecture and IT teams to onboard new data sources into

SIEM, ensuring proper normalization and parsing for detection use cases.

● Monitor platform performance, troubleshoot content execution issues, and assist in

maintaining the overall operational stability of the SIEM environment.


Collaboration and Improvement

● Work closely with SOC Analysts, Threat Hunters, and Incident Responders to

understand their needs and develop content that directly supports their operations.

● Participate in post-incident review processes to identify detection and automation gaps

and drive improvements.

● Stay current with the latest cybersecurity trends, attack vectors, and SIEM features and

updates.

Qualifications

Required Skills and Experience

● 3+ years of experience in Security Operations, Threat Hunting, or Detection Engineering.

● Demonstrable expertise in designing and implementing detection content using a

SIEM/SOAR platform (strong preference for Palo Alto Networks XSIAM/Cortex XSOAR

experience).

● Deep understanding of the cyber kill chain and MITRE ATT&CK framework.

● Proficiency in scripting languages (e.g., Python, PowerShell) for automation and data

manipulation.

● Strong knowledge of security logging formats, network protocols, operating systems

(Windows, Linux), and cloud environments.

● Experience with API integrations and developing automation playbooks (SOAR).

● Excellent analytical, problem-solving, and communication skills.

Preferred Qualifications

● Hands-on experience with Palo Alto Networks XSIAM, including content creation and

automation development.

● Relevant industry certifications (e.g., PCNSE, PCSAE, GCIH, GCFA, CISSP).

● Experience with cloud security monitoring (AWS, Azure, GCP).

● Familiarity with threat intelligence platforms and integrating intelligence feeds into

detection logic.

Apply for this Position

Ready to join ? Click the button below to submit your application.

Submit Application