Manage and mentor a team of SOC analysts (Tier 1-3) across multiple shifts Oversee threat hunting, incident response, and security monitoring operations Develop and refine SOC procedures, playbooks, and escalation processes Health insurance Food allowance Provident fund Annual bonus
We are looking for a motivated and detail-oriented SOC Analyst with at least 1 year of experience to join our growing Security Operations Center (SOC) team. As a SOC Analyst, you will play a crucial role in monitoring and protecting the organizations IT infrastructure and data from cyber threats. You will work closely with other security professionals to detect, analyze, and respond to security incidents in a timely manner, ensuring a secure environment for the company. Key Responsibilities: - Monitor Security Alerts: Actively monitor security tools and systems, such as SIEM (Security Information and Event Management), EDR, XDR. - Incident Detection & Response: Detect, triage, and respond to security incidents, ensuring proper escalation and documentation of incidents as needed. - Threat Intelligence: Leverage threat intelligence platforms to identify emerging threats and vulnerabilities. Collaborate with internal teams to implement appropriate defensive measures. - Log Analysis: Analyze and correlate logs from various security systems and network devices to identify patterns and potential security breaches. - Vulnerability Management: Assist in vulnerability assessment activities, including regular scanning and analysis of systems, applications, and networks. - Incident Reporting: Document and maintain incident records, preparing incident reports and post-mortems when necessary. - Collaboration & Escalation: Work closely with other internal teams (IT, Network Security, and Risk Management) to resolve security incidents. Escalate issues to senior analysts and management as necessary. - Continuous Learning: Stay up to date with the latest security trends, threats, and technologies. Participate in training and development to enhance knowledge and skills. Requirements - Experience: Minimum of 1 year of experience working in a Security Operations Center (SOC) or in a similar role related to cybersecurity. Technical Skills: - Experience with SIEM, EDR, XDR platforms. - Knowledge of firewalls, intrusion detection/prevention systems, antivirus, and endpoint protection tools. - Familiarity with incident management tools . - Basic understanding of networking protocols (TCP/IP, HTTP, DNS, etc.). - Experience in analyzing security logs and identifying anomalies. Soft Skills: - Strong problem-solving skills and analytical mindset. - Excellent communication skills (both written and verbal) to effectively document and communicate findings. - Ability to work under pressure and in a fast-paced environment. - Attention to detail and ability to prioritize tasks.
We are seeking a highly motivated and skilled SOC L2 Analyst to join our security team at Bangalore & Chennai. The ideal candidate will be responsible for advanced security incident analysis, threat hunting, and the development of new detection rules and playbooks. This role will also have a partial focus on security governance, including assisting with policy development and ensuring compliance. This is a hybrid position with dedicated L2 resources operating on-site, while the majority of monitoring activities are conducted by the remote SOC team. Key Responsibilities Security Operations & Incident Response: Act as a primary responder for escalated security incidents, performing detailed analysis and leading the incident response process. Conduct proactive threat hunting using security data from various sources to identify potential threats and vulnerabilities. Develop, test, and maintain security playbooks and automated response actions to improve efficiency and reduce Mean Time to Respond (MTTR). Fine-tune security tools and platforms, including XSIAM, to minimize false positives and enhance detection capabilities. Collaborate with internal IT teams and external partners to remediate identified security issues. Provide mentorship and guidance to L1 analysts, assisting with complex incident triage and analysis. Governance & Compliance: Assist in the creation and maintenance of security policies, procedures, and standards. Ensure the SOC operations and processes adhere to internal policies and relevant industry compliance frameworks. Participate in security audits and assessments, providing necessary data and documentation to validate compliance. Contribute to regular reporting on the companys security posture and key performance indicators (KPIs) to leadership. This role will be part of a dedicated on-site team of L2 analysts. The on-site team will be responsible for in-person support and direct collaboration with local stakeholders, while security monitoring and a larger portion of the incident analysis will be handled by the remote SOC team. This hybrid model requires a high degree of independence, initiative, and clear communication. Requirements Required Qualifications Proven experience as a SOC L2 Analyst or a similar role in a security operations environment. Strong understanding of cybersecurity principles, common attack vectors, and incident response methodologies. Hands-on experience with Security Information and Event Management (SIEM) solutions, particularly with a strong preference for XSIAM. Proficiency in scripting languages (e.g., Python, PowerShell) for automation and data analysis. Excellent analytical and problem-solving skills with meticulous attention to detail. Strong communication and collaboration skills, with the ability to work effectively with both technical and non-technical teams.
We are seeking a highly motivated and detail-oriented individual with a fundamental understanding of cybersecurity principles and a passion for protecting digital assets. This entry-level position is ideal for candidates with a background in scripting or software development and a desire to build a career in incident response and cyber defense. Key Responsibilities: Assist in basic forensic investigations and incident response initiatives. Support in implementation of security tools, technologies, and appliances across the enterprise. Write and maintain simple scripts and automation tools to enhance security operations. Contribute to security documentation, playbooks, and operational runbooks. Stay updated with the latest trends and developments in cybersecurity. Requirements Required Skills & Qualifications: Fundamental understanding of Cyber Security concepts , including threat vectors and mitigation techniques. Basic knowledge of incident response processes and forensic investigation . Proficiency in scripting and software development using tools such as Python, Perl, Shell, C/C++, or .NET. Awareness of log aggregation and correlation platforms such as SIEM tools. Understanding of network security technologies , such as firewalls, IDS/IPS, proxies, and endpoint protection. Strong problem-solving abilities and attention to detail. Good written and verbal communication skills. Preferred Qualifications (Nice to Have): Bachelors degree in Computer Science, Information Technology, Cyber Security, or a related field. Familiarity with tools like PaloAlto, Wireshark, Splunk, or ELK Stack will be an added advantage. Certifications such as CompTIA Security+, CEH, or equivalent will be highly valued.