Jobs
Interviews

46 Soc Analyst Jobs

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

4.0 - 8.0 years

0 Lacs

hyderabad, telangana

On-site

You will be joining Marvell as a CyberSecurity Analyst, where you will play a crucial role in identifying and responding to threats against Marvell data and systems. As part of the Security Operations Center (SOC), your responsibilities will include providing primary triage, analysis, and operational support for security events and alerts. You will utilize various security analytics tools, log aggregators, and threat intelligence repositories to perform correlation and investigate security incidents. Your role will involve real-time incident handling, intrusion correlation, threat analysis, and system remediation to support deployable Incident Response. Additionally, you will participate in analyzing the nature of attacks, conducting root cause analysis of incidents, and monitoring external data sources proactively to identify potential security issues that may impact the enterprise. Furthermore, you will document and publish incident findings, techniques, and reports to relevant stakeholders within Marvell. You will also contribute to improvement tasks such as false positive reduction and use case refinement, while effectively communicating both verbally and in writing updates on alerts and incidents. To be successful in this role, you should have at least 4 years of experience as a SOC Analyst, preferably in a large enterprise environment. You must possess strong communication skills and the ability to tailor your message to various audiences, ranging from technical subject matter experts to company executives. A deep understanding of MITRE ATT&CK framework, proficiency in technical writing, and the ability to solve problems in ambiguous situations are essential. Moreover, you should have experience working with technologies such as IDS/IPS, NGFW, EDR, SIEM, HIDS/HIPS, AV, and Vulnerability Scanners. Industry security certifications like C|EH and relevant GIAC certifications are highly desirable, along with experience in IT service management and infrastructure operations in an enterprise-level organization. Marvell offers competitive compensation and benefits, fostering an environment of collaboration, transparency, and inclusivity. You will have access to resources and support to succeed in impactful work and opportunities for growth and development within the company. To learn more about working at Marvell, you can visit our Careers page.,

Posted 2 days ago

Apply

1.0 - 5.0 years

0 Lacs

karnataka

On-site

Choosing Capgemini means choosing a company where you will be empowered to shape your career in the way you'd like, where you'll be supported and inspired by a collaborative community of colleagues around the world, and where you'll be able to reimagine what's possible. Join us and help the world's leading organizations unlock the value of technology and build a more sustainable, more inclusive world. Analyzing cyber threat data from multiple sources including open-source intelligence (OSINT), internal network logs, threat feeds, and commercial threat intelligence platforms is a key responsibility. You will perform the intelligence capitalization within the Group owned Threat Intelligence Platform and leverage Threat Intelligence Platforms, SIEM tools, and other security technologies to automate the collection, analysis, and dissemination of threat intelligence. Utilizing threat modeling techniques to anticipate and prioritize potential risks based on evolving cyber threat trends will be part of your role. You will assist with risk assessments, vulnerability management, and penetration testing efforts by providing insights into possible threat actor targeting and attack vectors. Investigating Indicators of Compromise (IOCs), Tactics, Techniques, and Procedures (TTPs), and malware samples to identify emerging threats and vulnerabilities is a critical aspect of the job. Correlating threat data with internal logs, threat intelligence platforms, and external sources to build comprehensive threat profiles is also part of your responsibilities. Providing technical threat intelligence support during active security incidents, assisting in the identification of malicious activity, threat actor attribution, and incident containment will be required. Working closely with the Incident Response & Threat hunting team to analyze and track threat actors, their tactics, and attack methods is essential. You will participate in the tools Proof of Concept used/expected by the Team and regularly look for their relevancy given the evolution of the Group needs. Applying the Business Continuity Plan for the Group Cyber Threat Intelligence Team and ensuring that the Service Level Agreements (SLAs) are not breached are also part of your duties. Primary Skills required for this role include experience in a Cyber Threat Intelligence or related cybersecurity role (e.g., SOC Analyst, Security Researcher, Incident Responder), familiarity with open-source intelligence (OSINT) & Social Media Intelligence (SOCMINT) tools and techniques, understanding of the cyber threat landscape, advanced persistent threats (APTs), and attack methodologies (e.g., MITRE ATT&CK framework), general intelligence knowledge, knowledge about intelligence capitalization, associations, and correlation, familiarity with threat intelligence platforms (e.g., OpenCTI, ThreatConnect, Anomali, MISP), and familiarity with security tools like SIEM (Splunk, QRadar) and endpoint security would be appreciated.,

Posted 3 days ago

Apply

3.0 - 7.0 years

0 Lacs

hyderabad, telangana

On-site

As a SOC Analyst, you will be responsible for monitoring and analyzing security events to protect the organization's information systems. You will play a crucial role in identifying and responding to security incidents to ensure the integrity and confidentiality of data. This is a full-time position with the opportunity for permanent employment or a contractual/temporary role with a contract length of 36 months. The benefits include health insurance coverage to support your well-being. In this role, you will work in a dynamic environment with day shift and rotational shift schedules. Your primary work location will be in person, where you will collaborate with the team to enhance the organization's security posture and respond to emerging threats effectively.,

Posted 6 days ago

Apply

1.0 - 4.0 years

2 - 6 Lacs

Hyderabad

Work from Office

CorroHealth is looking for Executive SOC Analyst to join our dynamic team and embark on a rewarding career journey Assisting with the preparation of operating budgets, financial statements, and reports Processing requisition and other business forms, checking account balances, and approving purchases Advising other departments on best practices related to fiscal procedures Managing account records, issuing invoices, and handling payments Collaborating with internal departments to reconcile any accounting discrepancies Analyzing financial data and assisting with audits, reviews, and tax preparations Updating financial spreadsheets and reports with the latest available data Reviewing existing financial policies and procedures to ensure regulatory compliance Providing assistance with payroll administration Keeping records and documenting financial processes

Posted 1 week ago

Apply

3.0 - 8.0 years

3 - 12 Lacs

Chennai

Work from Office

Responsibilities: * Conduct threat analysis using SOC tools like QRadar & LogRhythm. * Collaborate with incident response team on security incidents. * Monitor network activity for suspicious behavior.

Posted 1 week ago

Apply

4.0 - 8.0 years

0 Lacs

punjab

On-site

As a SOC Analyst (Incident Management) with 4+ years of experience, you will be based in Mohali, working strictly from the office with a 5-day work week and a 30-day notice period. Your role will be crucial in resolving cyber security incidents and collaborating with the IT Infrastructure and application teams to support daily SOC operations. Your responsibilities will include acting as a primary incident responder and coordinator, performing incident handling through effective communication and coordination efforts, triaging incidents, escalating security incidents to senior staff when necessary, tracking and analyzing incidents using a ticket management system, and engaging IT teams for remediation. You will also be responsible for planning and managing incident response procedures, documenting security incidents, and assisting in enhancing the operational efficiency of SOC platforms. To excel in this role, you should have familiarity with incident management principles and frameworks, knowledge of SIEM, AV, EDR, Next-Gen Firewalls, Cloud Platforms, and IT networking concepts. You should possess strong skills in monitoring and reporting security remediations, incident response activities, effective documentation, as well as verbal and written communication. Stakeholder management, experience in a complex matrix environment, and the ability to work in an international multicultural team are also essential. If you are looking to utilize your skills as a SOC Analyst in incident management, this role offers the opportunity to contribute to the resolution of cyber security incidents, improve SOC operational efficiency, and collaborate with diverse teams to enhance overall security posture.,

Posted 1 week ago

Apply

0.0 - 2.0 years

2 - 6 Lacs

Mumbai

Work from Office

":" Job Title: L1 SOC Analyst LogRhythm SIEM Location: Mumbai, India Employment Type: Full-Time | Onsite About the Role: We are seeking a proactive and dedicated L1 SOC Analyst to join our Security Operations Center in Mumbai. The analyst will be the first line of defense, responsible for monitoring, triaging, and escalating security alerts using LogRhythm SIEM. This is an excellent opportunity for candidates looking to build a strong career in cybersecurity operations. Key Responsibilities: - Monitor security events and alerts through LogRhythm SIEM console - Perform initial analysis, classification, and triage of security incidents - Escalate genuine security incidents to L2 SOC team following defined procedures - Maintain incident logs, documentation, and shift handover reports - Support incident investigations by collecting relevant logs and evidence - Monitor health of SIEM log sources and report issues proactively - Follow SOC playbooks and response procedures with high attention to detail - Participate in shift-based operations (24x7 rotational shifts) Key Skills & Competencies: - 0.6 to 2 years of experience in SOC or cybersecurity monitoring role - Hands-on exposure to LogRhythm SIEM - Knowledge of security event types, log analysis, and basic networking concepts - Understanding of common security threats, malware, phishing, brute force, etc. - Good communication skills both written and verbal - Ability to work effectively under pressure and as part of a team Preferred Qualifications: - BachelorDegree in Information Security, Computer Science, or related field - LogRhythm Certificationsoptional but desirable - Security certifications like CompTIA Security+, CEH an added advantage ","

Posted 1 week ago

Apply

2.0 - 5.0 years

3 - 7 Lacs

Mumbai

Work from Office

":" Job Title: L2 SOC Analyst LogRhythm SIEM Location: Mumbai, India Employment Type: Full-Time | Onsite About the Role: We are looking for an experienced L2 SOC Analyst to strengthen our Security Operations Center in Mumbai. The ideal candidate will have 2 to 5 years of hands-on experience in security monitoring and incident analysis, particularly on LogRhythm SIEM. You will be responsible for in-depth analysis, incident investigation, escalation, and coordination with response teams. Key Responsibilities: - Monitor, analyze, and triage security alerts from LogRhythm SIEM and other security platforms - Investigate and validate security incidents with detailed analysis and impact assessment - Conduct threat hunting and advanced log correlation as per SOC playbooks - Respond to incidents as per defined escalation matrix and coordinate with internal/external teams - Perform root cause analysis, recommend containment and mitigation actions - Provide guidance and mentorship to L1 SOC Analysts for escalated incidents - Prepare incident reports, analysis summaries, and dashboards for management - Monitor and report SIEM health, log source integration issues, and tuning requirements - Participate in continuous improvement of detection rules and SOC processes - Work in 24x7 rotational shifts with readiness for critical incident handling Required Skills & Competencies: - 2 to 5 years of SOC operations experience, with a focus on SIEM monitoring and incident handling - Strong hands-on experience with LogRhythm SIEM (Mandatory) - Good understanding of security threats, attack vectors, malware behavior, and common vulnerabilities - Practical experience in analyzing logs from firewalls, IDS/IPS, endpoint security, and cloud platforms - Familiarity with MITRE ATT&CK framework and threat intelligence usage - Strong analytical thinking, incident response capabilities, and problem-solving skills - Good communication skills for incident reporting and escalation Preferred Certifications: - LogRhythm Certified Deployment Engineer (LCDE) or LogRhythm Certified SOC Analyst (LCSA) - Optional - CompTIA Security+, CEH, CySA+, or equivalent security certifications - Any threat hunting or incident response certification is a plus Work Mode: Onsite Mumbai SOC Facility Shift: 24x7 Rotational Shifts (Including Nights and Weekends) ","

Posted 1 week ago

Apply

2.0 - 6.0 years

0 Lacs

kochi, kerala

On-site

As an Academic Advisor for Cybersecurity Training & Certification at Technovalley Software India Pvt. Ltd., located in Kochi, India, you will play a crucial role in guiding aspiring students, IT professionals, and corporate partners towards achieving internationally recognized certifications and unlocking global career opportunities. Your main responsibilities will include providing professional career guidance and counselling to individuals interested in pursuing Cybersecurity career paths such as Ethical Hacking, Cybersecurity Analyst, Computer Hacking Forensic Investigator, Offensive Security Certified Cybersecurity, Penetration Testing, SOC Analyst, Threat Intelligence, and Incident Response. You will be tasked with understanding the career aspirations and goals of each individual and recommending appropriate certification and training programs to align with their career trajectory. Additionally, you will educate prospective learners on global certification standards from renowned organizations like EC-Council, OffSec, CompTIA, PECB, and Microsoft. You will also offer insights into industry demand for Cybersecurity professionals, expected salary growth, and career scope in various Cybersecurity fields. Your role will involve coordinating the admission process, following up with leads, ensuring high admission conversion rates, and promoting scholarship opportunities for eligible candidates. Furthermore, you will be responsible for building relationships with students, acting as a student success partner, and collaborating with the placement cell to ensure certified students receive career assistance and placement opportunities. The desired qualifications for this role include a Bachelor's degree in Computer Science, Cybersecurity, IT, or related fields, along with a minimum of 2-3 years of experience in academic counselling, career guidance, or technical training consultation, preferably in Cybersecurity, IT Training, or EdTech industries. To excel in this role, you should possess a strong understanding of Cybersecurity certifications, excellent communication and negotiation skills, and the ability to work towards achieving aggressive targets. Your passion for helping individuals build careers in Cybersecurity, along with your familiarity with global job markets and career trends in Cybersecurity and IT Security domains, will be key assets in this position. Joining Technovalley will offer you the opportunity to work with India's leading Cybersecurity Training Company, engage with global professionals and industry leaders, and contribute to shaping the next generation of Cybersecurity professionals in India and beyond. This role also comes with a competitive salary, performance-based incentives, and the chance to drive career transformation in the cybersecurity space.,

Posted 1 week ago

Apply

7.0 - 9.0 years

9 - 14 Lacs

Gurugram, Bengaluru

Hybrid

SOC Analyst Core Responsibilities Monitor security dashboards and alerts to identify potential threats. Respond to security incidents by following established response plans. Conduct threat hunting to proactively identify vulnerabilities and potential threats. Collaborate with other departments, such as network engineering and incident response teams, for coordinated threat response. Analyze security incidents and document findings to prevent future occurrences. Develop and maintain security monitoring tools and processes. Implement and optimize SIEM, SOAR, EDR, and Threat Intelligence platforms. Conduct vulnerability assessments and penetration tests to identify weaknesses. Create and maintain incident response procedures and playbooks. Provide detailed reports on security incidents and emerging threats. Stay updated with the latest cybersecurity trends and threats. Experience 7-9 years of experience in cybersecurity, with a focus on SOC operations. Extensive experience with security monitoring tools and incident response. Proficiency in threat hunting and vulnerability analysis. Strong knowledge of network protocols, operating systems, and common cybersecurity threats. Experience with SIEM, SOAR, EDR, and Threat Intelligence platforms. Ability to conduct in-depth threat intelligence analysis and develop containment strategies. Experience in conducting vulnerability assessments and penetration tests. Excellent analytical and problem-solving skills. Strong communication and collaboration skills. Knowledge of frameworks such as NIST Cybersecurity framework, MITRE ATT&CK, and Lockheed Martin Cyber Kill Chain.

Posted 2 weeks ago

Apply

5.0 - 9.0 years

0 Lacs

haryana

On-site

At Bravura Solutions, collaboration, diversity, and excellence matter greatly. We highly value your ideas, providing you with the space to be curious and innovative within an exciting, fast-paced, and flexible environment. There is a variety of skills and abilities that we look for, focusing on how you can contribute value to Bravura and our unique culture. As a global leader in the FinTech market and an ASX listed company, Bravura is a trusted partner to over 350 prominent financial services clients, offering wealth management technology and products. Our significant investments in technology hubs and innovation labs drive our future-focused mindset, developing cutting-edge, digital-first technology solutions to help our clients achieve financial security and prosperity for their customers. The Security Operations Analyst position at Bravura is integral to shaping a growing information security function during a period of high-impact transformation. As a key member of our team, you will support the build-out of our internal capability and work closely with our outsourced SOC provider. This role involves incident response coordination, vulnerability management, and offensive security activities, including penetration testing support and remediation tracking. Your responsibilities will include acting as the in-house lead for escalations from our third-party MDR/SOC, coordinating vulnerability management programs, supporting penetration tests, ensuring security operations align with client requirements, tracking operational metrics and security KPIs, developing incident response playbooks and procedures, monitoring the threat landscape, and supporting audits and client due diligence processes. To be successful in this role, you should have at least 5 years of experience in a security operation, incident response, or SOC analyst role, along with familiarity with vulnerability management tools, regulatory requirements in financial services or highly regulated environments, incident response frameworks, and bonus skills like scripting/automation and cloud security experience. Industry security certifications are a plus. At Bravura, we prioritize our employees" well-being and career development. We offer competitive salaries, a comprehensive employee benefits scheme, flexible working hours to promote work-life balance, maternity/parental leave policies, cab facilities in Delhi/NCR, meal facilities, and free medical insurance. We base our hiring decisions on your experience, skills, and passion, so even if you do not meet all the listed requirements, we encourage you to apply. Interviews are primarily conducted virtually, and we are open to making reasonable adjustments. All final applicants will undergo a criminal record and background check, with each application being considered on its own merits.,

Posted 2 weeks ago

Apply

4.0 - 8.0 years

6 - 10 Lacs

Bengaluru

Work from Office

Clifyx Technology. is looking for SOC Analyst & SOC Lead to join our dynamic team and embark on a rewarding career journey. Monitor and analyze security events and incidents, identifying and investigating potential threats Maintain the security of our network and systems by implementing security controls and best practices Work closely with the rest of the security team to ensure that our systems and networks are secure and compliant with industry standards Maintain accurate documentation and reports on security events and incidents Communicate effectively with team members and other stakeholders to ensure that security issues are addressed in a timely and effective manner Stay up to date with the latest security technologies and threats

Posted 2 weeks ago

Apply

2.0 - 5.0 years

4 - 7 Lacs

Bengaluru

Work from Office

Clifyx Technology. is looking for SOC Analyst to join our dynamic team and embark on a rewarding career journey. Monitor and analyze security events and incidents, identifying and investigating potential threats Maintain the security of our network and systems by implementing security controls and best practices Work closely with the rest of the security team to ensure that our systems and networks are secure and compliant with industry standards Maintain accurate documentation and reports on security events and incidents Communicate effectively with team members and other stakeholders to ensure that security issues are addressed in a timely and effective manner Stay up to date with the latest security technologies and threats

Posted 2 weeks ago

Apply

6.0 - 11.0 years

7 - 8 Lacs

Bengaluru

Work from Office

Were looking for a dynamic and enthusiastic SOC Analyst to join our team and contribute to the expansion of our security services. Job Title: Sr SOC Analyst Job Location: Bangalore, India Education Qualification: Bachelor s degree in computer science, Information Technology, or related field Compensation: Competitive Pay Desired Experience: Minimum 6+ years of technology experience in End Point Detection & Response, Network Detection & Response, IDP and IDS, Email Security, SOC Operations, and Incident Management. Job Description: As a Sr SOC Engineer you will be responsible for securing and identifying cybersecurity threats for our IT and Plant networks. You will investigate and triage event logs from endpoints, networks, firewalls, and SDWAN for cybersecurity infiltration, data exfiltration, and other cybersecurity incidents. You will also source cybersecurity incidents external to the organization, create detection and prevention controls, and implement comprehensive log and event sourcing. Your role will prioritize detection and response plans based on the impact to assets, people, data, finances, and brand image. Key Responsibilities: SOC Operations Coordinate with MSSP partners for key initiatives, providing requirements and support for project delivery. Deploy robust incident response, forensics, and threat intelligence processes. Lead the delivery of incident management system enhancements and modifications. Drive process improvements, identifying opportunities for positive change to enhance SOCs detection and response capabilities. Threat Hunting and Protection Investigate network systems or endpoints to identify threat patterns or indicators of compromise, and analyze threats. Coordinate with the IT and OT teams to resolve cyber threats and prevent recurrence. Analyze and detect cyber threats affecting business operations using threat intelligence. Monitor security patterns to identify, isolate, and detect threats before attackers exploit them. Incident Response and Reporting Lead incident response efforts, minimizing impact and conducting technical and forensic investigations to determine breach details and extent of damage. Track security incident-related KPIs and metrics, assisting in reporting these metrics to the SOC Cyber Threat Detection & Response leader. Key Skills and Knowledge:: Strong interpersonal and communication skills (written and oral) with the ability to communicate at all organizational levels. Organized, responsive, and highly thorough problem solver. Structured, analytic, and independent working methods. Ability to work with cross-functional and multicultural teams; result-oriented. Ability to operate effectively in global networks and cross-functional environments. Proven track record in quickly and aggressively resolving problems in application security/crisis resolution. Strong process orientation with the ability to bring structure to broadly defined problems and needs. Proven self-starter with the initiative to build organizational capability and deliver committed results. Employment Type: Fulltime (1 Year Rolling contract) Your professional Details Second highest qualification Upload your CV I read and agree to By clicking the button you agree to our

Posted 2 weeks ago

Apply

7.0 - 12.0 years

9 - 14 Lacs

Bengaluru

Work from Office

. Level 3 SOC Responder Role Overview: A Level 3 SOC Analyst is responsible for advanced threat detection, incident response, and continuous monitoring of security events. They lead investigations, coordinate responses, and mentor junior analysts, ensuring the security and integrity of information systems. Key Responsibilities: Lead the investigation and response to complex security incidents, including advanced persistent threats (APTs), malware outbreaks, and insider threats Liaison between SOC and customer Incident response team to handle complex incidents Document security incidents, investigative findings, and remediation activities in accordance with established incident response procedures and protocols Suggest SIEM rule finetuning to reduce false positive alerts Develop standard operating procedures (SOPs) Perform quality review of the alerts handled by L1 and L2 Track KPIs and create dashboards for executive briefing Provide guidance and mentorship to junior SOC analysts, imparting knowledge and best practices in incident detection, analysis, and response. Conduct training sessions and workshops to enhance the skills and capabilities of SOC team members Skills and Qualifications: Education: Bachelor s degree in Cybersecurity, Information Technology, Computer Science, or a related field. Experience: 7+ years of experience in SOC operations, incident response, and threat hunting. Experience in CrowdStrike SIEM and EDR preferred. Certifications (Preferred): Relevant certifications such as CISSP, CEH, GCIH, or similar. Problem-Solving Skills: Excellent problem-solving skills and attention to detail. Communication Skills: Strong communication skills, both written and verbal. Work Environment: Typically works in a security operations center. May require shift work to provide 24/7 monitoring.

Posted 3 weeks ago

Apply

5.0 - 10.0 years

7 - 12 Lacs

Bengaluru

Work from Office

col-tn-12 col-lg-8 padding-0 centered"> About this position About this Position: Analysis, Coordinate the containment and eradication of malicious activities with internal and external parties and investigate, document, and report on any information security (InfoSec) issues What you ll do: Monitor, analyze, prioritize security events & perform remediation by utilizing playbooks Threat and vulnerability analysis by leveraging data from different tools and sources - utilize case management tool Investigate on aggregated security events from SIEM solution Mitigate risks before security events reach critical infrastructure Investigate, document, and report on any information security (InfoSec) issues as well as emerging trends Analysis and response to previously unknown hardware and software vulnerabilities Coordinate the containment and eradication of malicious activities with internal and external parties Notify appropriate business stakeholders about serious security events Implement security improvements by assessing current situation, evaluating market trends, and anticipating requirements What makes you a good fit: Masters degree in computer science or IT/Engineering with focus on IT security 5 years of broad professional experience in a similar role Deep understanding of how a state-of-the-art Security Operation Center operates and common tools used within a SOC Experience in use of The Hive and Elasticsearch are beneficial A certification or qualification in the context of IT security with reference to Red Team/Blue Team would be highly desirable Well-settled experience in IT security management with the ability to deep-dive into technical topics Proven analytical and report writing skills and Fluent in English Start-up mentality and the willingness to develop together in a young team Some perks of joining Henkel: Flexible work scheme with flexible hours, hybrid work model, and work from anywhere policy for up to 30 days per year Diverse national and international growth opportunities Globally wellbeing standards with health and preventive care programs Gender-neutral parental leave for a minimum of 8 weeks Employee Share Plan with voluntary investment and Henkel matching shares Best-in-class Group Medical Insurance policy covering employee, spouse and up to 2 children Competitive accident and term life policies for up to 3 times annual gross salary Progressive OPD policy of INR 30,000 for employee, spouse and up to 2 children

Posted 3 weeks ago

Apply

5.0 - 10.0 years

10 - 15 Lacs

Bengaluru

Work from Office

Who we are Were a leading, global security authority thats disrupting our own category. Our encryption is trusted by the major ecommerce brands, the worlds largest companies, the major cloud providers, entire country financial systems, entire internets of things and even down to the little things like surgically embedded pacemakers. We help companies put trust - an abstract idea - to work. Thats digital trust for the real world. Job Summary The Security Operations Canter (SOC) provides DDoS detection and mitigation services for DigiCert and customers networks. The SOC also provides all Customer Support capabilities for the UltraSecurity service. We are seeking a Senior Information Security Engineer to support our ever-growing customer base. What You Will Do Exhibit a proactive security mindset to defend customer networks from DDoS attacks. Follow runbooks to conduct DDoS attack mitigation and response. Conduct deep analysis of customer traffic and mitigations to improve customer response. Handle escalations from associate SOC engineers. Assist with complex attacks to refine mitigation strategies. Monitor customer networks and mitigate DDoS attacks. Monitor the SOC ticket queue and proactively take action to protect DigiCert and customer networks. Manage engagements with white glove and strategic customers. Assist in the creation and updating of SOC policies and processes. Answer the phone queue for Tier 1 support for UltraDDoS and UltraWAF customers. Assist customers with resolving technical issues within the UltraSecurity services. What You Will Have 5+ years of experience in cybersecurity operations, including ticket triage, escalations, alerting. Experience with DDoS attacks and mitigations a plus. CompTIA Network+ and Security+ certifications. Familiarity with tools such as Zendesk ticketing systems, Atlassian suite or services. Fluent in writing and speaking English. Excellent written and verbal communication skills, as well as interpersonal skills. Demonstrated ability to engage in continuous learning and applying strong analytical skills to respond to customer needs and problem-solving. Understanding of IPv4, low level networking and protocols, to include DNS, and how they relate to the security risk landscape. Understanding of and ability to explain the OSI Model. Nice to Have PSAA (Practical SOC Analyst Associate) certification CompTIA CySA, CASP, or SecurityX certifications Experience with Arbor equipment and Sightline Threat Management system Benefits Generous time off policies Top shelf benefits Education, wellness and lifestyle support #LI-SD1 __PRESENT

Posted 3 weeks ago

Apply

1.0 - 3.0 years

3 - 6 Lacs

Chennai

Work from Office

[{"Salary":null , "Remote_Job":false , "Posting_Title":"SOC Analyst" , "Is_Locked":false , "City":"Chennai" , "Industry":"IT Services","Job_Description":" What you will do, - Real-time monitoring of alerts generated from multi-vendor security solutions. - Perform initial investigation of suspicious alerts and escalation of possible incidents to L2 team for further investigation. - Create daily, weekly, and monthly reporting as required. - Provide insights to SIEM Engineering team to fine-tune rules for

Posted 3 weeks ago

Apply

3.0 - 7.0 years

3 - 7 Lacs

Chennai

Work from Office

SOC Analyst Exciting opportunity at hashtag#Corrohealth Infotech Private Limited in Chennai! We are seeking a SOC Analyst with a minimum of 3 years of experience in SOC. Immediate joiners preferred. Eligibility Criteria: - Minimum 3 years in SOC - Any Degree -WFO(Flexibility shift) Certifications: - Cloud Security (Microsoft) - CEH - CompTIA Security+ (any of these) Required Skills: - Work Experience in security tools like SIEM, Vulnerability and Assessment tools, EDR, Data loss prevention, Threat hunting tools - In-depth knowledge of security concepts such as cyber-attacks and techniques, threat vectors, risk management, incident management, etc. - Proficient in Incident Management and Response - Expertise in cyber security, firewalls, network security, application security, cloud security - Knowledge in SOC, HITRUST, ISO certifications, and HIPAA, NIST frameworks How to Apply: Interested candidates can contact: RESHMA (HR) Phone: 9361279443

Posted 3 weeks ago

Apply

5.0 - 11.0 years

7 - 11 Lacs

Chennai

Work from Office

Teleperformance Global services is looking for SOC Analyst L3- Manager to join our dynamic team and embark on a rewarding career journey Collaborate with cross-functional teams to achieve strategic outcomes Apply subject expertise to support operations, planning, and decision-making Utilize tools, analytics, or platforms relevant to the job domain Ensure compliance with policies while improving efficiency and outcomes

Posted 4 weeks ago

Apply

5.0 - 9.0 years

5 - 10 Lacs

Kochi

Work from Office

Exp in SIEM,AV,Asset Monitoring tools(Rapid7,SentinelOne,Palo Alto Panorama,Nagios,Proofpoint TAP).Knowledge of malware prevention,threat detection,IT infra.Familiar with Office365,Azure,Citrix(XenApp),Windows OS.Exp in ticketing system(ConnectWise) Required Candidate profile Degree inMIS, Computer Science or similar. MS Certified (MCSE) or equivalent certification a plus.Security Certification (current/within 6 months),CompTIA Security+, CySA or Network+, ISC-2 CC

Posted 4 weeks ago

Apply

4.0 - 6.0 years

5 - 13 Lacs

Mumbai, Mumbai Suburban, Mumbai (All Areas)

Hybrid

Role & responsibilities At least 4.5 years of experience in the Cyber Security field / SOC / SIEM Strong understanding of cyber threat analysis models such as kill chain, MITRE Framework, etc and how they apply to both targeted and non-targeted threats Should have experience on SIEM alerts investigation. Experience on Operating Systems (Windows, UNIX) Strong understanding of common security products and technologies utilized in Enterprise environments (proxies, WAF, Firewalls, IDS/IPS, Anti-Malware, Endpoint, etc) Good Understanding of the OSI stack and the various protocols from layer 1 to 7 including SNMP, HTTP, VPN, DNS, etc. Independent, self-motivated and innovative with good problem solving, interpersonal and communication skills, and can foster teamwork Preferred candidate profile Hands on experience in Soc and Mitre Framework, Threat, Working on L2 level only.

Posted 4 weeks ago

Apply

3.0 - 6.0 years

3 - 7 Lacs

Gurugram

Work from Office

CloudZent Technology services is looking for SOC (Security Operations Center) Analyst to join our dynamic team and embark on a rewarding career journey Monitor and analyze security events from SIEM tools Respond to incidents and escalate threats as needed Perform forensic investigations and maintain logs Ensure compliance with cybersecurity policies

Posted 1 month ago

Apply

1.0 - 5.0 years

3 - 7 Lacs

Pune

Work from Office

LOCATION : Pune DATE : 28 April 2025 JOB TYPE : FULL TIME Salary: 4-6L GSOC Analyst Position Overview: The SOC Analyst will be responsible for ensuring the safety and security of VOIS s operations and personnel through continuous monitoring of electronic security systems, incident reporting, and resolution. This role requires strong analytical capabilities, exceptional communication skills, and a thorough understanding of security protocols. Key Responsibilities Work in Shifts as per roster created by GSOC Supervisor. Monitor CCTV and alarm systems 24/7 to identify and respond to security incidents. Coordinate with the Site Lead / Site Analysts across VOIS IN Locations. Have proper knowledge of electronic security systems (CCTV & Access). Generate and update daily, weekly, and monthly reports. Monitoring of material movement. Possess excellent knowledge and command of e-security systems. Support internal and external audits. Conduct event assessments and deploy manpower as needed. Monitoring of building evacuation drills. Manage the entire facilitys manned guarding effectively from the GSOC. Act as a Supervisor when required for short durations. Provide necessary support to the Emergency Response Team (ERT). Proficient in drafting comprehensive global reports and travel advisories, ensuring clear communication and timely dissemination of critical information

Posted 1 month ago

Apply

4.0 - 9.0 years

0 - 3 Lacs

Navi Mumbai, Pune, Mumbai (All Areas)

Hybrid

Role & responsibilities Preferred candidate profile Experience: 4+ Years Location: Mumbai Design, operate, manage SOAR and automation platform Creation, maintenance, and customization of cross platform playbooks/workflows. Centralized automated tracking of SLAs, KPIs & KRIs Automating analysis and response workflows for routine security analyst activities Ensure alignment of automated responses with organizational policies with an objective of reduced Mean Time to Respond (MTTR) and minimized damage. Intra SOC technologies integrations Integration with IT security technologies and IT technologies Define response playbooks and oversee automated actions Automated filtering of false positives and prioritizing genuine threats for investigation Ongoing efforts to decrease Mean Time to Detect (MTTD), Mean Time to Repair (MTTR), number of false positives and improving overall efficiency of SOC. Provide Annual roadmap for innovations, new initiatives, SOC Automation & Process Enhancement with quarterly milestones the same shall be linked to respective milestone-based payments. The roadmap should align with the bank's security strategy, support ongoing SOC maturity, and adapt to emerging threats and regulatory changes. Required Certification: Mandatory (Any-one): - Certified SOC Analyst (EC-Council), Computer Hacking Forensic Investigator (EC-Council), Certified Ethical Hacker (EC-Council), CompTIA Security+, CompTIA CySA+ (Cybersecurity Analyst), GIAC Certified Incident Handler (GCIH) or equivalent. Product Certifications (Preferred): - Product Certifications on SOC Security Tools such as SIEM/Vulnerability Management/ DAM/UBA/ SOAR/NBA etc

Posted 1 month ago

Apply
Page 1 of 2
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies