Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
3.0 - 8.0 years
5 - 9 Lacs
bengaluru, karnataka, india
On-site
Role Overview As a SOC Analyst supporting one of our client engagements, you will be responsible for monitoring, analysing, and resolving security-related tickets as part of a dedicated 16x5 Security Operations Centre. This role is critical to ensuring timely triage and resolution of incidents, maintaining compliance with our client s security standards, and supporting continuous improvement of detection and response capabilities. Key Responsibilities Ticket Analysis & Resolution: Review, investigate, and resolve security tickets raised through our client s monitoring systems and service desk workflows. Alert Triage: Priorities and categories alerts based on severity, impact, and relevance to our client s threat landscape. Incident Documentation: Maintain accurate and detailed records of investigations, actions taken, and resolution outcomes in our client s ticketing system. Collaboration: Work closely with our client s internal teams, including infrastructure, application, and compliance teams, to ensure coordinated incident handling. Playbook Execution: Follow and refine client-specific response playbooks and standard operating procedures (SOPs). Shift Handover: Ensure clear and complete handover documentation between shifts to maintain continuity of operations. Required Skills & Qualifications1 3 years of experience in a SOC or cybersecurity operations role. Familiarity with SIEM platforms (e.g., Microsoft Sentinel, Log Rhythm), ticketing systems (e.g., ServiceNow, Xurrent), and endpoint protection tools (e.g., Microsoft Defender, Sentinel One). Experience supporting and resolving common SOC playbook scenarios (e.g., phishing emails, Windows/Linux malware, Microsoft 365/ Entra ID account compromise) Strong analytical skills and attention to detail in reviewing logs, alerts, and incident data. Understanding of cybersecurity frameworks such as MITRE ATT&CK and NIST. Excellent written and verbal communication skills for documenting incidents and collaborating with stakeholders. Bachelor s degree in Computer Science, Information Security, or a related field. Preferred Certifications Comp TIA Security+, CEH, or Microsoft SC-200. ITIL Foundation (for understanding ticketing and service workflows). Working Hours Rotational shifts within a 16x5 schedule (Monday to Friday). After-hours and weekend on-call rotation Flexibility to support critical incidents outside standard hours when required.
Posted 16 hours ago
3.0 - 7.0 years
0 Lacs
navi mumbai, maharashtra
On-site
The role is based in Navi Mumbai and you will be required to attend a Face to Face Drive on 5th July (Saturday), with all rounds of the interview process scheduled for the same day. The ideal candidate should have an immediate to 45 days" notice period. Your main responsibilities will include round-the-clock threat monitoring and detection, as well as the analysis of any suspicious, malicious, and abnormal behavior. You will be responsible for alert triage, initial assessment, incident validation, severity determination, and urgency evaluation. Additionally, you will need to prioritize security alerts and create Incidents following Standard Operating Procedures (SOPs). It will be your duty to report and escalate incidents to stakeholders and conduct post-incident analysis. You will be expected to consistently triage incidents and provide recommendations using playbooks. Furthermore, you will be required to develop and maintain incident management and incident response policies and procedures. Part of your role will involve the preservation of security alerts and security incident artifacts for forensic purposes. You must adhere to Service Level Agreements (SLA) and Key Performance Indicators (KPIs) and work towards reducing the Mean Time to Detection and Response (MTTD & MTTR).,
Posted 1 month ago
3.0 - 8.0 years
5 - 10 Lacs
Bengaluru
Work from Office
• Primary Skills: Prometheus, Grafana, Datadog ,Alerting Techniques, Alert Triage and Incident Management, Application Issues RCA/Debugging, SQL. • Proven L3 level experience in managing large-scale, distributed systems in production environments. Required Candidate profile Drive SRE transformations by building frameworks and migrating traditional IT support to modern SRE practices. Collaborate closely with development and operations teams to improve system observability
Posted 2 months ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
73564 Jobs | Dublin
Wipro
27625 Jobs | Bengaluru
Accenture in India
22690 Jobs | Dublin 2
EY
20638 Jobs | London
Uplers
15021 Jobs | Ahmedabad
Bajaj Finserv
14304 Jobs |
IBM
14148 Jobs | Armonk
Accenture services Pvt Ltd
13138 Jobs |
Capgemini
12942 Jobs | Paris,France
Amazon.com
12683 Jobs |