Posted:18 hours ago| Platform: Linkedin logo

Apply

Work Mode

On-site

Job Type

Full Time

Job Description

TRIARQ Health

is a physician practice services company that partners with doctors to run modern patient-centered practices so they can be rewarded for delivering high-value care. TRIARQ’s physician-led partnerships simplify practices’ transition to value-based care by combining our proprietary, cloud-based practice, care management platform, and patient engagement services to help doctors focus on better outcomes.

Industry Type:

IT-Software, Software Services

Location:

Nashik, Pune and Mumbai

Division:

Healthcare Technology

Job Summary

We are seeking an experienced SOC Analyst with 4–5 years of hands-on experience in security monitoring, incident investigation, and vulnerability management. The ideal candidate should have strong analytical skills, excellent communication abilities, and practical experience working with modern EDR, SIEM, and cloud security tools.

Responsibilities

  • Monitor, triage, and analyze security incidents/alerts from EDR solutions (e.g., CrowdStrike).
  • Monitor phishing alerts and email threats using tools like Mimecast.
  • Perform detailed investigation and diagnosis of security incidents to determine severity and root cause.
  • Operate and manage SIEM platforms (Splunk) for log analysis, alert tuning, and dashboard creation.
  • Manage vulnerability reporting cycles (weekly, monthly, and ad hoc) using Tenable, WIZ, and Mend.
  • Produce vulnerability reports and risk summaries for technical teams and management.
  • Create dashboards and visualizations in SIEM and vulnerability platforms to track KPIs and KRIs.
  • Collaborate with cross-functional teams (IT, Cloud, Network, AppSec) for incident response and remediation.
  • Maintain documentation such as incident reports, SOPs, and playbooks.

Skill Requirements

  • 4–5 years of SOC or Security Operations experience.
  • Understanding of security frameworks, incident response lifecycle, and threat hunting methods.
  • Hands-on expertise with Splunk SIEM.
  • Strong experience with EDR tools (CrowdStrike preferred).
  • Preferred knowledge of Tenable, WIZ, Checkpoint, and Mimecast.
  • Ability to prepare and present reports to management.
  • Strong communication, reporting, and presentation skills.
  • Must be able to work independently in a fast-paced SOC environment.

Work experience:

4-5 years

Employment Type:

Full Time, Permanent

Mock Interview

Practice Video Interview with JobPe AI

Start Job-Specific Interview
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

coding practice

Enhance Your Skills

Practice coding challenges to boost your skills

Start Practicing Now

RecommendedJobs for You

nashik, maharashtra, india

hyderabad, telangana, india

navi mumbai, maharashtra, india