Jobs
Interviews

3 Alert Triage Jobs

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

3.0 - 8.0 years

5 - 9 Lacs

bengaluru, karnataka, india

On-site

Role Overview As a SOC Analyst supporting one of our client engagements, you will be responsible for monitoring, analysing, and resolving security-related tickets as part of a dedicated 16x5 Security Operations Centre. This role is critical to ensuring timely triage and resolution of incidents, maintaining compliance with our client s security standards, and supporting continuous improvement of detection and response capabilities. Key Responsibilities Ticket Analysis & Resolution: Review, investigate, and resolve security tickets raised through our client s monitoring systems and service desk workflows. Alert Triage: Priorities and categories alerts based on severity, impact, and relevance to our client s threat landscape. Incident Documentation: Maintain accurate and detailed records of investigations, actions taken, and resolution outcomes in our client s ticketing system. Collaboration: Work closely with our client s internal teams, including infrastructure, application, and compliance teams, to ensure coordinated incident handling. Playbook Execution: Follow and refine client-specific response playbooks and standard operating procedures (SOPs). Shift Handover: Ensure clear and complete handover documentation between shifts to maintain continuity of operations. Required Skills & Qualifications1 3 years of experience in a SOC or cybersecurity operations role. Familiarity with SIEM platforms (e.g., Microsoft Sentinel, Log Rhythm), ticketing systems (e.g., ServiceNow, Xurrent), and endpoint protection tools (e.g., Microsoft Defender, Sentinel One). Experience supporting and resolving common SOC playbook scenarios (e.g., phishing emails, Windows/Linux malware, Microsoft 365/ Entra ID account compromise) Strong analytical skills and attention to detail in reviewing logs, alerts, and incident data. Understanding of cybersecurity frameworks such as MITRE ATT&CK and NIST. Excellent written and verbal communication skills for documenting incidents and collaborating with stakeholders. Bachelor s degree in Computer Science, Information Security, or a related field. Preferred Certifications Comp TIA Security+, CEH, or Microsoft SC-200. ITIL Foundation (for understanding ticketing and service workflows). Working Hours Rotational shifts within a 16x5 schedule (Monday to Friday). After-hours and weekend on-call rotation Flexibility to support critical incidents outside standard hours when required.

Posted 16 hours ago

Apply

3.0 - 7.0 years

0 Lacs

navi mumbai, maharashtra

On-site

The role is based in Navi Mumbai and you will be required to attend a Face to Face Drive on 5th July (Saturday), with all rounds of the interview process scheduled for the same day. The ideal candidate should have an immediate to 45 days" notice period. Your main responsibilities will include round-the-clock threat monitoring and detection, as well as the analysis of any suspicious, malicious, and abnormal behavior. You will be responsible for alert triage, initial assessment, incident validation, severity determination, and urgency evaluation. Additionally, you will need to prioritize security alerts and create Incidents following Standard Operating Procedures (SOPs). It will be your duty to report and escalate incidents to stakeholders and conduct post-incident analysis. You will be expected to consistently triage incidents and provide recommendations using playbooks. Furthermore, you will be required to develop and maintain incident management and incident response policies and procedures. Part of your role will involve the preservation of security alerts and security incident artifacts for forensic purposes. You must adhere to Service Level Agreements (SLA) and Key Performance Indicators (KPIs) and work towards reducing the Mean Time to Detection and Response (MTTD & MTTR).,

Posted 1 month ago

Apply

3.0 - 8.0 years

5 - 10 Lacs

Bengaluru

Work from Office

• Primary Skills: Prometheus, Grafana, Datadog ,Alerting Techniques, Alert Triage and Incident Management, Application Issues RCA/Debugging, SQL. • Proven L3 level experience in managing large-scale, distributed systems in production environments. Required Candidate profile Drive SRE transformations by building frameworks and migrating traditional IT support to modern SRE practices. Collaborate closely with development and operations teams to improve system observability

Posted 2 months ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies