Passer au contenu principal
Rechercher

Lead Consultant – Cyber SOC Operations

Lieu Chennai, Tamil Nadu, Inde Job ID R-245605 Date de publication 02/10/2026

Job Title: Lead Consultant – Cyber SOC Operations

GCL: E

Introduction to role:

Are you ready to lead a high-impact Security Operations Center and defend the expertise behind life-changing medicines? As Lead Consultant – Cyber SOC Operations, you will guide incident response across a sophisticated digital world, safeguarding critical research, manufacturing, and patient-facing systems. Your decisions will reduce risk, maintain continuity, and keep our mission moving at speed.

You will join a collaborative team that blends deep security expertise with data, automation, and AI to outpace evolving threats. From day one, you will turn signals into crucial action, scale playbooks that improve, and mentor analysts to achieve steady, measurable outcomes. You see yourself transforming sophisticated telemetry into clear, business-saving decisions?

Accountabilities:

Incident Investigation: Lead investigations through analysis of logs, endpoint data, and network communication to resolve scope, impact, and next steps, accelerating time to containment and recovery.

Rapid Containment: Orchestrate containment actions such as suspending account access, isolating compromised devices, and blocking IPs to stop attacker movement and protect high-value assets.

Severity-based Issue: Apply risk-based judgment to raise incidents in line with impact, severity, and SLAs, ensuring focus and response from the right collaborators at the right time.

IOC and Threat Pattern Analysis: Analyze indicators of compromise and charge patterns to identify root behaviors, drive detection improvements, and close gaps.

Root Cause and Timeline Reconstruction: Conduct RCA, build accurate timelines, and foster insights back into controls, architecture, and training to prevent recurrence.

Cross-Tool Correlation: Link events from SIEM, EDR, network, and identity platforms to build a unified view of the charge chain and reduce noise.

SOAR Response Execution: Implement response actions through SOAR playbooks to deliver consistent, rapid, and auditable remediation.

Playbook Optimization: Assist in tuning playbooks and automation to improve fidelity, reduce false positives, and increase analyst efficiency.

Incident Documentation: Document incidents with clear evidence, actions, and decisions, creating a reusable institutional memory and enabling executive-level communication.

Runbook and SOP Maintenance: Keep runbooks, SOPs, and incident response documentation up to date so the team operates predictably and scales effectively.

Essential Skills/Experience:

  • Investigate security incidents using logs, endpoint telemetry, and network traffic

  • Contain incidents (account isolation, endpoint quarantine, IP blocking, etc.)

  • Raise incidents based on severity, impact, and SLAs

  • Analyze indicators of compromise (IOCs) and charge patterns

  • Perform root cause analysis (RCA) and timeline reconstruction

  • Correlate events across multiple tools and data sources

  • Implement response actions using SOAR playbooks

  • Assist in playbook tuning and automation improvement

  • Document incidents clearly with evidence and actions taken

  • Maintain runbooks, SOPs, and incident response documentation

  • Hands-on experience with enterprise SIEM and EDR platforms (e.g., Splunk, Microsoft Sentinel, CrowdStrike, Defender for Endpoint)

  • Proficiency with SOAR platforms and workflow design (e.g., Cortex XSOAR, Splunk SOAR), plus scripting in Python or PowerShell

  • Solid understanding of cloud security (Azure, AWS, GCP), identity security, and modern network security architectures

  • Familiarity with MITRE ATT&CK, NIST CSF, ISO 27035, and threat hunting techniques

  • Exposure to digital forensics, malware triage, and memory/network analysis

  • Experience defining SOC metrics, SLAs, and KPIs to measure and improve performance

  • Good communication skills for executive briefings and multi-functional coordination during fast paced events

  • Leadership experience in a 24x7 SOC environment, including mentoring analysts and coordinating major incidents

  • Relevant certifications such as CISSP, GIAC (GCIH, GCIA, GMON), or equivalent experience

  • Experience operating in highly supervised environments and aligning response with compliance expectations

When we put unexpected teams in the same room, we unleash aggressive thinking with the power to inspire life-changing medicines. In-person working gives us the platform we need to connect, work at pace and challenge perceptions. That's why we work, on average, a minimum of three days per week from the office. But that doesn't mean we're not flexible. We balance the expectation of being in the office while respecting individual flexibility. Join us in our unique and ambitious world.

Why AstraZeneca:

At AstraZeneca, our work has a direct impact on patients by transforming our ability to develop life-changing medicines. We empower the business to perform at its peak by combining modern science with leading digital technology platforms. With a passion for impacting lives through data, analytics, AI, machine learning, and more, we are committed to driving cross-company change to disrupt the entire industry. Join us at a crucial stage of our journey in becoming a digital and data-led enterprise

Here, the work of cybersecurity directly protects the science and systems that bring new medicines to patients. You will partner with diverse specialists who bring unexpected perspectives together to spark bold ideas, backed by investment in leading data, automation, and AI. We encourage experimentation and ownership, value kindness alongside ambition, and give you the platform to design resilient defenses that scale across a global enterprise. Your expertise will help unlock innovation at pace while keeping our mission safe.

Call to Action:

Lead the defense that powers breakthroughs—step into this role to shape resilient operations and safeguard the science that saves lives.

Date Posted

10-Feb-2026

Closing Date

17-Feb-2026

AstraZeneca embraces diversity and equality of opportunity.  We are committed to building an inclusive and diverse team representing all backgrounds, with as wide a range of perspectives as possible, and harnessing industry-leading skills.  We believe that the more inclusive we are, the better our work will be.  We welcome and consider applications to join our team from all qualified candidates, regardless of their characteristics.  We comply with all applicable laws and regulations on non-discrimination in employment (and recruitment), as well as work authorization and employment eligibility verification requirements.



AstraZeneca embraces diversity and equality of opportunity. We are committed to building an inclusive and diverse team representing all backgrounds, with as wide a range of perspectives as possible, and harnessing industry-leading skills. We believe that the more inclusive we are, the better our work will be. We welcome and consider applications to join our team from all qualified candidates, regardless of their characteristics. We comply with all applicable laws and regulations on non-discrimination in employment (and recruitment), as well as work authorisation and employment eligibility verification requirements.

Rejoignez notre réseau de talents

Inscrivez-vous pour recevoir des alertes emplois AstraZeneca.

S'inscrire
Glassdoor logo Rated four stars on Glassdoor

Une culture d'entreprise inspirante, des missions riches, des managers qui accompagnent et soutiennent. Des opportunités de rotation rapide au sein de l'entreprise. Ils accordent de l'importance à l'inclusion et à la diversité.