Security Analyst 2

5 - 10 years

7 - 17 Lacs

Posted:6 days ago| Platform: Naukri logo

Apply

Work Mode

Work from Office

Job Type

Full Time

Job Description

Location:

About the Role

Tier-2 SOC Analyst

Key Responsibilities

  • Perform

    Level-2 incident triage and response

    for security events including malware, phishing, data exposure, and policy violations.
  • Monitor, validate, and investigate alerts generated from

    SIEM and security tools

    and differentiate true positives from false positives.
  • Conduct

    log, endpoint, network, and cloud analysis

    to identify threat patterns and anomalies.
  • Act as an

    Incident Response coordinator/point-of-contact

    during major security events.
  • Create, track, and close incident tickets in line with policies and procedures.
  • Prepare

    incident reports, dashboards, RCA, and post-incident summaries.

  • Support

    threat hunting and forensic investigations

    when required.
  • Deploy, integrate, maintain, and troubleshoot

    SIEM and EDR tools/agents

    across endpoints and servers.
  • Maintain health monitoring and tuning for security platforms.
  • Recommend improvements to processes, controls, and detection use-cases.
  • Communicate security updates to technical teams and business stakeholders.

Required Experience

  • Minimum 4+ years of SOC / Cybersecurity / Incident Response experience.

  • Strong hands-on experience in at least one of the following:

    Splunk / QRadar / Securonix / Rapid7 / CrowdStrike / Trend Micro / Other SIEM-EDR tools.

  • Strong knowledge of

    Incident Response lifecycle, log analysis, alert validation, and network security concepts.

  • Experience analysing

    Windows, Linux/Unix, and network logs.

  • Experience with

    Vulnerability Scanners (Nessus, Tenable.io, Tenable.SC, Qualys, etc.).

  • Good understanding of

    firewalls, IDS/IPS, proxy, WAF, TCP/IP, endpoint security, antivirus, and EDR.

  • Excellent

    written and verbal communication skills

    with ability to interact with stakeholders.

Preferred Qualifications

  • Security certifications such as

    Security+, CEH, CYSA+ CISSP, CSA, etc.

  • Exposure to compliance standards like

    NIST, ISO 27001, PCI DSS, GDPR, FISMA.

  • Experience in

    threat hunting, forensic evidence handling, malware analysis

    is an advantage.

Key Competencies

  • Strong analytical and problem-solving skills
  • Ability to work independently in a

    24x7 SOC environment

  • High attention to detail and process discipline
  • Ability to remain calm and clear in crisis situations

Education

  • Bachelors Degree preferred
  • OR additional 2+ years relevant work experience

Mock Interview

Practice Video Interview with JobPe AI

Start Job-Specific Interview
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

coding practice

Enhance Your Skills

Practice coding challenges to boost your skills

Start Practicing Now

RecommendedJobs for You

hyderabad, pune, bengaluru

bengaluru, thiruvananthapuram

bengaluru, thiruvananthapuram