Saviynt17d ago
SOC L3 Analyst (Cloud Security Monitoring)
Bengaluru,Bangalorelead
SecurityOtherAnalystSoc AnalystCybersecurity
0 views0 saves0 applied
Quick Summary
Overview
Saviynt's AI-powered identity platform manages and governs human and non-human access to all of an organization's applications, data, and business processes.
Technical Tools
SecurityOtherAnalystSoc AnalystCybersecurity
Saviynt's AI-powered identity platform manages and governs human and non-human access to all of an organization's applications, data, and business processes. Customers trust Saviynt to safeguard their digital assets, drive operational efficiency, and reduce compliance costs. Built for the AI age, Saviynt is today helping organizations safely accelerate their deployment and usage of AI. Saviynt is recognized as the leader in identity security, with solutions that protect and empower the world’s leading brands, Fortune 500 companies and government institutions. For more information, please visit www.saviynt.com.
We are building a next-generation Security Operations Center (SOC) designed for the cloud-first era. We believe that effective security operations must evolve beyond traditional reactive methods. We are building an intelligent, automated SOC that combines deep cloud security expertise with robust automation to predict, prevent, and neutralize advanced threats faster than
ever.
We are seeking an L3 SOC Analyst - Cloud & Automation to serve as a senior technical expert and escalation point within our SOC. This role is for a hands-on-keyboard expert who thrives on hunting for advanced threats, automating responses, and mentoring junior analysts. You will be a key player in handling complex incidents, particularly those involving cloud environments, and
will be responsible for building and tuning the automation that allows our team to scale.
ever.
We are seeking an L3 SOC Analyst - Cloud & Automation to serve as a senior technical expert and escalation point within our SOC. This role is for a hands-on-keyboard expert who thrives on hunting for advanced threats, automating responses, and mentoring junior analysts. You will be a key player in handling complex incidents, particularly those involving cloud environments, and
will be responsible for building and tuning the automation that allows our team to scale.
Advanced Threat Response & Escalation
● Serve as the final technical escalation point for complex security incidents escalated from L1/L2 analysts.
● Conduct in-depth forensic analysis of compromised systems, kubernetes containers, malware, and network traffic to determine the full scope of an incident (root cause,
impact, remediation).
● Lead the response to high-severity security incidents, especially those originating in or targeting our cloud infrastructure (AWS, Azure).
● Analyze and correlate data from diverse sources (e.g., SIEM, EDR, CSPM, cloud-native logs) to uncover sophisticated attack patterns.
● Serve as the final technical escalation point for complex security incidents escalated from L1/L2 analysts.
● Conduct in-depth forensic analysis of compromised systems, kubernetes containers, malware, and network traffic to determine the full scope of an incident (root cause,
impact, remediation).
● Lead the response to high-severity security incidents, especially those originating in or targeting our cloud infrastructure (AWS, Azure).
● Analyze and correlate data from diverse sources (e.g., SIEM, EDR, CSPM, cloud-native logs) to uncover sophisticated attack patterns.
Security Automation & Orchestration
● Design, build, and maintain automated response playbooks in our SOAR platform to handle high-volume alerts and repetitive tasks.
● Develop and maintain custom AI agents to automate evidence collection, alert enrichment, and containment actions.
● Integrate security tools (EDR, SIEM, Cloud Security tools) via APIs to create seamless,
automated workflows.
● Continuously identify and implement new automation opportunities to reduce Mean Time to Detect (MTTD) and Mean Time to Respond (MTTR).
Proactive Threat Hunting & Cloud Security
● Proactively hunt for undetected threats across our enterprise and cloud environments using hypothesis-driven and intelligence-driven methods.
● Act as a Subject Matter Expert (SME) for cloud security monitoring, utilizing native tools like AWS GuardDuty, CloudTrail, CrowdStrike, Proofpoint,etc.
● Develop and tune advanced detection rules, SIEM correlation searches, and EDR queries based on new threat intelligence, hunting findings, and MITRE ATT&CK tactics.
● Proactively hunt for undetected threats across our enterprise and cloud environments using hypothesis-driven and intelligence-driven methods.
● Act as a Subject Matter Expert (SME) for cloud security monitoring, utilizing native tools like AWS GuardDuty, CloudTrail, CrowdStrike, Proofpoint,etc.
● Develop and tune advanced detection rules, SIEM correlation searches, and EDR queries based on new threat intelligence, hunting findings, and MITRE ATT&CK tactics.
Mentorship & Continuous Improvement
● Mentor and provide technical guidance to L1 and L2 analysts, helping to build their analytical and technical skills.
● Create and refine SOC documentation, including standard operating procedures (SOPs), runbooks, and incident response plans.
● Analyze incident trends and automation metrics to provide recommendations for improving security posture, detection logic, and playbook effectiveness.
● Bachelor’s degree in Computer Science, Information Security, or a related field.
● 6-10 years of experience in a Security Operations (SOC) environment, with at least 4 years in a senior analyst, threat hunter, or L2/L3 role.
● Strong Cloud Security Skills: Deep, hands-on experience with security monitoring and incident response in at least one major cloud provider (AWS, Azure, or GCP).
● Strong Automation & AI Skills: Proven ability to write scripts for automation with an ability to implement AI based automations for SOC use cases.
● Technical Expertise: Hands-on experience with SOAR platforms (e.g., CrowdStrike Fusion, Splunk SOAR) and SIEMs (e.g., Splunk, QRadar, CrowdStrike Falcon).
● Deep understanding of modern EDR solutions, container security, and host/system.
● Expert-level knowledge of the MITRE ATT&CK framework and its application to threat hunting and detection engineering.
● 6-10 years of experience in a Security Operations (SOC) environment, with at least 4 years in a senior analyst, threat hunter, or L2/L3 role.
● Strong Cloud Security Skills: Deep, hands-on experience with security monitoring and incident response in at least one major cloud provider (AWS, Azure, or GCP).
● Strong Automation & AI Skills: Proven ability to write scripts for automation with an ability to implement AI based automations for SOC use cases.
● Technical Expertise: Hands-on experience with SOAR platforms (e.g., CrowdStrike Fusion, Splunk SOAR) and SIEMs (e.g., Splunk, QRadar, CrowdStrike Falcon).
● Deep understanding of modern EDR solutions, container security, and host/system.
● Expert-level knowledge of the MITRE ATT&CK framework and its application to threat hunting and detection engineering.
● Be at the forefront of a modern, cloud-focused Security Operations Center.
● Drive the automation strategy that defines how our SOC operates and scales.
● Work with cutting-edge cloud-native security, automation, and threat intelligence technologies.
● Collaborate with world-class security and engineering leaders in a high-impact, hands-on role.
● Drive the automation strategy that defines how our SOC operates and scales.
● Work with cutting-edge cloud-native security, automation, and threat intelligence technologies.
● Collaborate with world-class security and engineering leaders in a high-impact, hands-on role.
Location & Eligibility
Where is the job
Bengaluru
Hybrid — some on-site time required
Who can apply
Same as job location
Listed under
Worldwide
Listing Details
- Posted
- April 12, 2026
- First seen
- April 13, 2026
- Last seen
- April 29, 2026
Posting Health
- Days active
- 15
- Repost count
- 0
- Trust Level
- 38%
- Scored at
- April 29, 2026
Signal breakdown
freshnesssource trustcontent trustemployer trust

Saviynt
lever
Saviynt is a leading provider of cloud-native identity and governance platform solutions, empowering enterprises to secure their digital transformation, safeguard critical assets, and meet regulatory compliance.
View company profileExternal application · ~5 min on Saviynt's site
Please let Saviynt know you found this job on Jobera.
3 other jobs at Saviynt
View all →Explore open roles at Saviynt.
Browse Similar Jobs
Manager2.7kFitness & Wellness2.1kData Collector1.9kAssistant Manager1.7kEngineer1.7kDirector1.6kAssociate1.3kConsultant1.1kBehavioral Health1.1kSocial Work & Counseling1kSocial Worker971Assistant952Social780Technician678Coordinator558Operations Associate549Psychiatric Mental Health Nurse Practitioner494Development488Staff Engineer472Human Resources (legacy human-resources)432
Newsletter
Stay ahead of the market
Get the latest job openings, salary trends, and hiring insights delivered to your inbox every week.
A
B
C
D
No spam. Unsubscribe at any time.