Posted:2 days ago| Platform: Linkedin logo

Apply

Work Mode

On-site

Job Type

Full Time

Job Description

Job Title

Overview

We are seeking a motivated SOC Analyst to join our team. This is a unique opportunity to gain hands-on experience in detecting, analyzing, and responding to cybersecurity threats while also contributing to research, automation, and advanced security initiatives.

This role blends operational monitoring with coding/scripting and R&D, making it ideal for candidates who want to grow into well-rounded cybersecurity professionals—not just alert responders. Candidates must be eager to learn, adaptable to rotating shifts (including night shifts), and passionate about making an impact in cybersecurity defense.



Key Responsibilities

  • Monitor, analyze, and respond to security alerts, incidents, and potential threats within a 24/7 SOC environment.
  • Perform initial triage, investigation, and escalation of security events, ensuring timely and accurate threat response.
  • Develop and improve automation scripts, tools, and playbooks (primarily in Python) to enhance SOC efficiency and reduce manual workload.
  • Participate in threat research: analyzing emerging attack vectors, malware, and vulnerabilities to strengthen detection strategies.
  • Contribute to security R&D projects—experimenting with new technologies, writing proof-of-concept scripts, and implementing detection logic.
  • Collaborate with senior analysts, threat hunters, and incident response on complex investigations.
  • Maintain documentation of incidents, findings, and process improvements.
  • Continuously upgrade skills through research, and certifications.



Requirements

  • Bachelor’s degree in Computer Science, Information Security, or related discipline (or equivalent experience).
  • Strong foundation in networking, operating systems, and security fundamentals (TCP/IP, logs, firewalls, SIEM, IDS/IPS).
  • Hands-on coding/scripting skills – preferably in Python (PowerShell, Bash, or other scripting languages are a plus).
  • Familiarity with SIEM solutions (Splunk, QRadar, Elastic, etc.) and log analysis.
  • Analytical and troubleshooting ability under pressure.
  • Good written and verbal communication skills. 
  • Strong willingness to work in rotational shifts (morning/afternoon/evening).



Preferred Skills

  • Certifications: CompTIA Security+, CySA+, CEH, or equivalent. are a plus
  • Exposure to malware analysis, threat intelligence,
  • Experience in creating custom detection rules or scripts (YARA, Sigma, Snort, etc.). are plus
  • Previous internship or hands-on project experience in a SOC, cybersecurity lab, or capture-the-flag (CTF) competitions.



Shift Details

  • 6 Day work week, 9hour shift
  • Rotating shifts (Morning/Evening/Night)
  • Must be comfortable with night shifts and flexible to work weekends/holidays as part of the rotation.



Benefits

  • Gain real SOC experience in a fast-paced cybersecurity environment.
  • Exposure to advanced tools, frameworks, and research projects that go beyond monitoring.
  • Learning and certification support for relevant cybersecurity credentials.
  • Clear career growth opportunities into Mid-level SOC, Threat Hunting, or Incident Response roles.


Mock Interview

Practice Video Interview with JobPe AI

Start Python Interview
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

coding practice

Enhance Your Python Skills

Practice Python coding challenges to boost your skills

Start Practicing Python Now

RecommendedJobs for You

kolkata, mumbai, new delhi, hyderabad, pune, chennai, bengaluru

hyderabad, telangana, india

noida, uttar pradesh

ahmedabad, gujarat, india