This position is posted by Jobgether on behalf of a partner company. We are currently looking for a Security Analyst in India.
This role offers the opportunity to be at the forefront of cybersecurity operations, monitoring and analyzing security events to protect critical systems and data. You will investigate incidents, perform technical analysis, and manage remediation actions while continuously improving defenses and threat detection strategies. Working in a dynamic 24/7 environment, you will collaborate with cross-functional teams to enhance security posture and mitigate risks. This position provides hands-on experience with cutting-edge tools and technologies in a fast-paced, mission-driven setting, allowing you to grow your expertise while contributing to organizational safety and resilience.
- Accountabilities:
- Monitor and analyze security traffic, events, and alerts, advising on remediation actions.
- Investigate intrusion attempts and exploit analysis, determining affected systems or data sets.
- Follow standard procedures for detecting, classifying, and reporting incidents.
- Analyze logs from multiple sources (EDR, firewalls, NIDS, HIDS, system logs) to determine remediation actions.
- Independently identify, contain, analyze, document, and eradicate malicious activity.
- Escalate critical security incidents and threat indicators to relevant stakeholders.
- Collaborate with internal teams across network, engineering, and applications to support incident resolution.
- Requirements:
- Bachelor’s degree in computer science, information systems, or related field OR 2–5 years of experience in SOC, incident response, or cyber forensics.
- Hands-on experience with Splunk or similar SIEM tools.
- Experience decoding logs from firewalls, proxies, EDRs, and other security devices.
- Knowledge of network architecture, intrusion detection systems, and web application security.
- Understanding of TCP/IP, OSI layers, Active Directory, and common application protocols (HTTP, SMTP, DNS).
- Familiarity with malware types (rootkits, trojans, adware, fileless attacks) and security incident handling.
- Strong organizational, analytical, and time management skills.
- Ability to communicate effectively across teams and document analysis and remediation steps.
- Preferred certifications: Security+, or equivalent.
- Benefits:
- Opportunity to work in a 24/7 rotational shift environment with cybersecurity exposure.
- Professional growth in incident response, SOC operations, and threat management.
- Collaborative and inclusive work culture encouraging learning and development.
- Exposure to advanced security technologies and frameworks.
- Supportive environment promoting skill development and mentorship.
Jobgether is a Talent Matching Platform that partners with companies worldwide to efficiently connect top talent with the right opportunities through AI-driven job matching.
When you apply, your profile goes through our AI-powered screening process designed to identify top talent efficiently and fairly.🔍 Our AI evaluates your CV and LinkedIn profile thoroughly, analyzing your skills, experience, and achievements.📊 It compares your profile to the job’s core requirements and past success factors to determine your match score.🎯 Based on this analysis, we automatically shortlist the three candidates with the highest match to the role.🧠 When necessary, our human team may perform an additional manual review to ensure no strong profile is missed.The process is transparent, skills-based, and free of bias — focusing solely on your fit for the role. Once the shortlist is completed, we share it directly with the company that owns the job opening. The final decision and next steps (such as interviews or additional assessments) are then made by their internal hiring team.Thank you for your interest!We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.