Delhi
INR 4.0 - 6.0 Lacs P.A.
On-site
Full Time
Role: SOC Analyst Job Type: Full Time, Permanent Location: Onsite – Delhi Experience Required: 1-3 Yrs Skills Required: 1) Working knowledge across various security appliances (e.g., Firewall, WAF, Web Security Appliance, Email Security Appliance, Antivirus). 2) Experience with SOC Operations tools like SIEM, NDR, EDR, UEBA, SOAR, etc. 3) Strong analytical and problem-solving skills, with a deep understanding of cybersecurity principles, attack vectors, and threat intelligence. 4) Knowledge of network protocols, security technologies, and the ability to analyze and interpret security logs and events to identify potential threats. 5) Scripting skills (e.g., Python, Bash, PowerShell) for automation and analysis purposes. 6) Skilled in evaluating and integrating inputs from people, processes, and technologies to identify effective solutions. 7) Demonstrate a thorough understanding of the interdependencies between these elements and leverages this knowledge to develop comprehensive, efficient, and sustainable problem-solving strategies. 8) Excellent communication skills to articulate complex technical concepts to non-technical stakeholders and collaborate effectively with team members. 9) Ability to prioritize and manage multiple tasks in a dynamic environment. 10) Willingness to stay updated with the latest cybersecurity trends and technologies. Job Responsibilities: 1) Continuously monitor and Analyze security alerts and logs to identify potential incidents. Analyze network traffic patterns to detect anomalies and identify potential security breaches. 2) Implement correlation rules and create playbooks as per requirements. Continuously update and suggest new rules and playbooks based on the latest attack vectors and insights from public articles and cybersecurity reports. 3) Use security compliance and scanning solutions to conduct assessments and validate the effectiveness of security controls and policies. Suggest improvements to enhance the overall security posture. 4) Utilize deception security solutions to deceive and detect potential attackers within the network. 5) Leverage deep expertise in networking, system architecture, operating systems, virtual machines (VMs), servers, and applications to enhance cybersecurity operations. 6) Work effectively with cross-functional teams to implement and maintain robust security measures. Conduct thorough forensic analysis of security incidents to determine root causes and impact. 7) Assist with all phases of incident response. Develop and refine incident response strategies and procedures to address emerging cyber threats. 8) Perform digital forensics to understand attack vectors and impact. Swiftly respond to and mitigate security threats, ensuring the integrity and security of organizational systems and data. 9) Professionally communicate and report technical findings, security incidents, and mitigation recommendations to clients. About Company Innspark is the fastest-growing Deep-tech Solutions company that provides next-generation products and services in Cybersecurity and Telematics. The Cybersecurity segment provides out-of-the-box solutions to detect and respond to sophisticated cyber incidents, threats, and attacks. The solutions are powered by advanced Threat Intelligence, Machine Learning, and Artificial Intelligence that provides deep visibility of the enterprise’s security. We have developed and implemented solutions for a wide range of customers with highly complex environments including Government Organizations, Banks & Financial institutes, PSU, Healthcare Providers, Private Enterprises. Website: https://innspark.in/ Job Types: Full-time, Permanent Pay: ₹400,000.00 - ₹600,000.00 per year Work Location: In person
Delhi, Delhi
INR 4.0 - 6.0 Lacs P.A.
On-site
Full Time
Role: SOC Analyst Job Type: Full Time, Permanent Location: Onsite – Delhi Experience Required: 1-3 Yrs Skills Required: 1) Working knowledge across various security appliances (e.g., Firewall, WAF, Web Security Appliance, Email Security Appliance, Antivirus). 2) Experience with SOC Operations tools like SIEM, NDR, EDR, UEBA, SOAR, etc. 3) Strong analytical and problem-solving skills, with a deep understanding of cybersecurity principles, attack vectors, and threat intelligence. 4) Knowledge of network protocols, security technologies, and the ability to analyze and interpret security logs and events to identify potential threats. 5) Scripting skills (e.g., Python, Bash, PowerShell) for automation and analysis purposes. 6) Skilled in evaluating and integrating inputs from people, processes, and technologies to identify effective solutions. 7) Demonstrate a thorough understanding of the interdependencies between these elements and leverages this knowledge to develop comprehensive, efficient, and sustainable problem-solving strategies. 8) Excellent communication skills to articulate complex technical concepts to non-technical stakeholders and collaborate effectively with team members. 9) Ability to prioritize and manage multiple tasks in a dynamic environment. 10) Willingness to stay updated with the latest cybersecurity trends and technologies. Job Responsibilities: 1) Continuously monitor and Analyze security alerts and logs to identify potential incidents. Analyze network traffic patterns to detect anomalies and identify potential security breaches. 2) Implement correlation rules and create playbooks as per requirements. Continuously update and suggest new rules and playbooks based on the latest attack vectors and insights from public articles and cybersecurity reports. 3) Use security compliance and scanning solutions to conduct assessments and validate the effectiveness of security controls and policies. Suggest improvements to enhance the overall security posture. 4) Utilize deception security solutions to deceive and detect potential attackers within the network. 5) Leverage deep expertise in networking, system architecture, operating systems, virtual machines (VMs), servers, and applications to enhance cybersecurity operations. 6) Work effectively with cross-functional teams to implement and maintain robust security measures. Conduct thorough forensic analysis of security incidents to determine root causes and impact. 7) Assist with all phases of incident response. Develop and refine incident response strategies and procedures to address emerging cyber threats. 8) Perform digital forensics to understand attack vectors and impact. Swiftly respond to and mitigate security threats, ensuring the integrity and security of organizational systems and data. 9) Professionally communicate and report technical findings, security incidents, and mitigation recommendations to clients. About Company Innspark is the fastest-growing Deep-tech Solutions company that provides next-generation products and services in Cybersecurity and Telematics. The Cybersecurity segment provides out-of-the-box solutions to detect and respond to sophisticated cyber incidents, threats, and attacks. The solutions are powered by advanced Threat Intelligence, Machine Learning, and Artificial Intelligence that provides deep visibility of the enterprise’s security. We have developed and implemented solutions for a wide range of customers with highly complex environments including Government Organizations, Banks & Financial institutes, PSU, Healthcare Providers, Private Enterprises. Website: https://innspark.in/ Job Types: Full-time, Permanent Pay: ₹400,000.00 - ₹600,000.00 per year Work Location: In person
Delhi, Delhi
INR 2.4 - 3.0 Lacs P.A.
On-site
Full Time
About the Role As a fresher SOC Analyst in an OEM environment, you'll learn how to operate SIEM platforms that monitor networking devices and hardware logs. This is a hands-on opportunity to develop foundational cybersecurity skills, from basic alert triage to refining detection capabilities. Key Responsibilities 1. SIEM Monitoring & Alert Triage Use SIEM tools to monitor alerts and events from network devices, and endpoints. Perform initial triage: distinguish security incidents from false positives, and escalate them appropriately. Document and log all alert investigations clearly in the SOC ticketing system. 2. Log & Incident Documentation Analyze system and network logs to detect anomalies or IOC patterns. Support incident documentation with root cause analysis and step-by-step actions taken. Maintain detailed incident records to support compliance and escalation. 3. SIEM Configuration Support Assist in onboarding new log sources: collect, normalize, and categorize OEM system logs. Help tune existing correlation rules to reduce alert fatigue and improve accuracy under guidance 4. Learning, Process & Collaboration Collaborate with senior analysts and network engineers to enhance detection coverage and FAQ procedures. Participate in SIEM rule tuning, dashboard creation, and documenting standard operating procedures (SOPs). Engage in continuous learning: attend training, internal sessions, and keep up with emerging threats and best practices. Technical Skills & Qualifications Basic knowledge of networking (OSI model, TCP/IP, DNS, HTTP), security principles, and common cyber threats (malware, phishing, ransomware) . Hands-on experience with home labs or training platforms . Strong problem-solving skills and attention to detail when investigating logs. Exposure to Python, PowerShell, or regex helpful for log parsing or automation. Soft Skills Demonstrable curiosity and eagerness to learn the best entry-level analysts are team players looking to grow and iterate fast . Effective communication , both written and verbal for documenting incidents and collaborating across teams. Attention to detail and discipline in following SOPs and logging investigative steps. Ability to work in shifts (including early or late hours) as part of a SOC 24/7 environment. Job Type: Full-time Pay: ₹240,000.00 - ₹300,000.00 per year Location: Dehli, Delhi (Required) Work Location: In person
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.