Home
Jobs

1295 Soc Jobs - Page 22

Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
Filter
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

18.0 - 26.0 years

80 - 100 Lacs

Hyderabad, Chennai, Bengaluru

Work from Office

Naukri logo

Minimum 18+ years of experience post Engineering degree in EE or EC. Proven expertise in SoC design methodologies and architecture definition Deep understanding of RTL development, integration, and backend handoff.

Posted 2 weeks ago

Apply

7.0 - 12.0 years

0 - 0 Lacs

Mumbai Suburban, Navi Mumbai, Mumbai (All Areas)

Work from Office

Naukri logo

Incident Response: Deep expertise in handling end-to-end incident responsedetection, investigation, containment, eradication, and recovery. Attack Vectors: Solid understanding of phishing, malware, ransomware , and how to respond effectively to these threats. Cyber Kill Chain: Strong knowledge of the cyber kill chain framework, including how adversaries progress through the stages of an attack. Adversary Tactics: Familiarity with adversary techniques and tactics, particularly using frameworks such as MITRE ATT&CK to mitigate threats. SIEM & EDR Tools: Extensive experience with SIEM tools like Splunk and ArcSight , and EDR solutions like CrowdStrike or Microsoft Defender . Scenario Handling: Capable of tackling complex, scenario-based challenges with a strategic mindset. Role & responsibilities

Posted 2 weeks ago

Apply

1.0 - 2.0 years

3 - 4 Lacs

Pune

Work from Office

Naukri logo

So, what s t he r ole all about As a member of the Cloud Security team, a successful Cloud Security Analyst will need to be self-sufficient to collaborate effectively with multiple teams, such as Application Support, Infrastructure Operations, DevOps, Product R&D, Security teams, customers and 3 rd party auditors. This role will hold the responsibility of understanding the Cloud security policies, procedures, practices and technologies and documenting them appropriately as well as demonstrating to auditors and customers the excellent Cloud Security at NICE. A successful candidate in this role will be able to work in production cloud environments to collect and curate evidence and explain it to anyone who asks for it. Experience with Governance, Risk and Compliance (GRC) is a big plus! How will you make an impact You will directly impact the success of the NICE cloud business by ensuring all customer and auditory security requirements are met and demonstrated. A diverse, merit-driven work environment which rewards a growth mindset and encourages innovation and continued professional development; The opportunity to work in a global, highly skilled, passionate workforce to deliver world-class service and products to market. Competitive pay and excellent benefits. Generous PTO policies. A highly focused security & compliance team which is collaborative, supportive, experienced, and driven to help everyone from the individual to enterprise to our customers realize the success for which they aim. Have you got what it takes 1-2 years of experience with Information Security & Compliance or GRC University-level degree in InfoSec, Computer Science or other related field. knowledge with major compliance frameworks such as PCI, ISO 27001/17, SOC 2, HITRUST, GDPR. A burning curiosity to learn as much as you can about the NICE cloud environment and the services and products we offer our customers as well as the existing security infrastructure we have in place today; Excellent communications skills along to work collaboratively with security team members and operations and development teams or independently to achieve tactical and strategic security goals; Strong organization and prioritization skills; Education, training or experience with security and compliance fundamentals; Experience working with work tracking tools such as JIRA, Service Now or others. What s in it for you Enjoy NICE-FLEX! Requisition ID: 7117 Reporting into: Technical Manager Role Type: Individual Contributor About NICE

Posted 2 weeks ago

Apply

10.0 - 15.0 years

11 - 15 Lacs

Bengaluru

Work from Office

Naukri logo

Job : Business Analyst -Cybersecurity Jobs in Bangalore (J49072)- Job in Bangalore Business Analyst -Cybersecurity (Job Code : J49072) Job Summary 10 - 15 Years Business Analyst -Cybersecurity BE-Comp/IT, BEd Stream of Study: Engineering-Computer, Engineering-Electrical Key Skills: Job Post Date: Tuesday, June 3, 2025 Company Description The co is redefining the future of cybersecurity and AI systems by building trusted, explainable, and intelligent GenAI solutions. As a company focused on AI for Security and Security for AI , they empower organizations to harness the power of Generative AI, Agentic AI, and advanced ML pipelines with full transparency and control. Job Description Key Responsibilities: Gather, analyse, and document business requirements for cybersecurity products, tools, and services. Collaborate with stakeholders to define use cases, workflows, and business processes aligned with cybersecurity best practices. Translate business needs into functional and technical specifications for engineering teams. Support risk assessments and compliance initiatives by analysing existing systems and identifying security gaps. Monitor industry trends and threat intelligence to inform product and business strategy. Assist with business case development, including cost-benefit analysis and ROI projections. Work with QA and DevOps teams to ensure solutions meet business and regulatory requirements. Prepare detailed reports and presentations for internal and external stakeholders. Facilitate meetings, interviews, and workshops to elicit requirements and feedback. Qualifications: An Engineering Degree in Computer Science, Information Systems, Cybersecurity, or a related field. 7+ years of experience as a Business Analyst, with adequate depth in the cybersecurity domain. Strong understanding of cybersecurity principles, frameworks and threat landscape (e. g. , SIEM, SOAR, XDR, or TIP) Experience working with GenAI/LLM use cases in security contexts would be strong pref. Proven experience in business process modelling, data analysis, and documentation. Familiarity with compliance requirements such as GDPR, HIPAA, or SOC 2 is a plus. Proficient in tools like JIRA, Confluence, Visio, or similar platforms. Strong communication and interpersonal skills to work effectively with technical and non-technical stakeholders.

Posted 2 weeks ago

Apply

8.0 - 12.0 years

10 - 20 Lacs

Mysuru, Pune, Bengaluru

Hybrid

Naukri logo

Role & responsibilities SOC Automation Managing and operating Microsoft Sentinel Log Source Onboarding : Onboard and troubleshoot log sources (on-premises and cloud) to the Sentinel platform using syslog, APIs, and other mechanisms. Ensure data integrity, reliability, and proper formatting. Log Management : Hands-on experience with log collection, parsing, and analysis from various sources (e.g., firewalls, endpoints, cloud environments). Strong defensive mindset with understanding of security events of interest for building detection rules Good in query languages like KQL. Advanced threat intelligence with the help of kusto query language (KQL). Should have advanced knowledge on use case creation, parser development DevOps Knowledge : Understanding of DevOps practices such as CICD pipelines, GIT, ARM templates, and Azure Automation for streamlining processes. Creation of automation rules.Use of threat intelligence in Azure sentinel. Implement and optimize security controls in cloud environments ( AWS, Azure, GCP), enforcing security-as-code principles and compliance automation . Experience in working with SOAR tools Sentinel SOAR Experience with programming (preferably Javascript, Python, REST API), automation or machine learning SIEM Migration : Proven experience in SIEM migration projects and transitioning between platforms will be advantage. Good command of the English language, both written and verbally Apply here: https://career.infosys.com/jobdesc?jobReferenceCode=INFSYS-EXTERNAL-210438

Posted 2 weeks ago

Apply

8.0 - 12.0 years

10 - 20 Lacs

Hubli, Pune, Bengaluru

Hybrid

Naukri logo

Role & responsibilities SOC Automation Managing and operating Microsoft Sentinel Log Source Onboarding : Onboard and troubleshoot log sources (on-premises and cloud) to the Sentinel platform using syslog, APIs, and other mechanisms. Ensure data integrity, reliability, and proper formatting. Log Management : Hands-on experience with log collection, parsing, and analysis from various sources (e.g., firewalls, endpoints, cloud environments). Strong defensive mindset with understanding of security events of interest for building detection rules Good in query languages like KQL. Advanced threat intelligence with the help of kusto query language (KQL). Should have advanced knowledge on use case creation, parser development DevOps Knowledge : Understanding of DevOps practices such as CICD pipelines, GIT, ARM templates, and Azure Automation for streamlining processes. Creation of automation rules.Use of threat intelligence in Azure sentinel. Implement and optimize security controls in cloud environments ( AWS, Azure, GCP), enforcing security-as-code principles and compliance automation . Experience in working with SOAR tools Sentinel SOAR Experience with programming (preferably Javascript, Python, REST API), automation or machine learning SIEM Migration : Proven experience in SIEM migration projects and transitioning between platforms will be advantage. Good command of the English language, both written and verbally Apply here: https://career.infosys.com/jobdesc?jobReferenceCode=INFSYS-EXTERNAL-210438

Posted 2 weeks ago

Apply

3.0 - 8.0 years

5 - 15 Lacs

Noida

Remote

Naukri logo

Position: SOC Analyst 100% Remote Working Hours: US/UK hours Job description: We are seeking a highly motivated and skilled SOC Analyst to join our Security Operations Center. Key Responsibilities Monitor security events and alerts using tools such as Splunk, IBM QRadar, Microsoft Sentinel, and Palo Alto XSIAM. Perform initial triage and categorization of security events to determine severity and potential impact. Escalate confirmed incidents to appropriate teams or stakeholders with accurate and detailed information. Correlate logs and alerts across various platforms to detect anomalous behavior or indicators of compromise (IoCs). Utilize the MITRE ATT&CK framework to enrich detection and response processes. Collaborate with Incident Response and Threat Intelligence teams for deeper investigations. Generate reports and dashboards for incident trends, KPIs, and SOC performance. Maintain documentation of SOC procedures, playbooks, and workflows. Participate in regular threat-hunting and detection engineering activities. Continuously evaluate and tune detection rules and alerts for improved accuracy. Required Qualifications Education: Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or related field (or equivalent experience) Certifications: CompTIA Security+ CySA+ Certified SOC Analyst (CSA) or equivalent Required Skills and Experience 3+ years of experience in a SOC environment or cybersecurity operations Proficient with SIEM platforms: Splunk, IBM QRadar, Microsoft Sentinel Experience with EDR/XDR platforms like Palo Alto XSIAM and CrowdStrike Falcon Familiarity with MITRE ATT&CK and threat detection mapping Preferred Qualifications Understanding of cloud security monitoring (Azure, AWS, GCP) Exposure to SOAR tools and incident response automation Knowledge of NIST, ISO 27001, and other security compliance frameworks Interested candidate can apply: dsingh15@fcsltd.com

Posted 2 weeks ago

Apply

5.0 - 10.0 years

12 - 18 Lacs

Pune, Bengaluru, Delhi / NCR

Hybrid

Naukri logo

SOC Analyst 5+ Years of exp in SOC, and should have exp with Azure/AWS cloud. Exp in Remediation and "Defender for Cloud " is a must. About the role As a SOC Analyst L3, you will play a critical role in strengthening our organization's security posture through proactive threat detection and response. You will monitor system and network activity for any dangers or weaknesses and delve into the details of potential security incidents. Along the way, you will get to: Incident Analysis: Analyze security notifications to identify potential security issues and evaluate their impact and severity. Incident Response: Oversee the response to verified security incidents, including containment measures and investigation. Threat and Vulnerability Analysis: Investigate, document, and report on information security issues and emerging trends. Adjust Security Tools and Processes: Fine-tune security tools and processes to improve the organization's overall security posture. Be Ambitious: This opportunity is not just about what you do today but also about where you can go tomorrow. When you bring your hunger, heart, and harmony to Insight, your potential will be met with continuous opportunities to upskill, earn promotions, and elevate your career. What were looking for Technical Proficiency: In-depth knowledge of security protocols, techniques, and technologies. Analytical Skills: Ability to analyze system performance and troubleshoot complex security issues. Communication: Effective communication skills to interact with team members and stakeholders. What you can expect Were legendary for taking care of you, your family and to help you engage with your local community. We want you to enjoy a full, meaningful life and own your career at Insight. Some of our benefits include: Freedom to work from another locationeven an international destination—for up to 30 consecutive calendar days per year. Medical Insurance Health Benefits Professional Development: Learning Platform and Certificate Reimbursement Shift Allowance But what really sets us apart are our core values of Hunger, Heart, and Harmony, which guide everything we do, from building relationships with teammates, partners, and clients to making a positive impact in our communities. Join us today, your ambITious journey starts here. When you apply, please tell us the pronouns you use and any reasonable adjustments you may need during the interview process. At Insight, we celebrate diversity of skills and experience so even if you don’t feel like your skills are a perfect match - we still want to hear from you! Today's talent leads tomorrow's success. Learn more about Insight: https://www.linkedin.com/company/insight/

Posted 2 weeks ago

Apply

3.0 - 8.0 years

8 - 12 Lacs

Pune

Work from Office

Naukri logo

Greetings from Peoplefy Infosolutions !!! We are hiring for one of our reputed MNC client based in Pune. We are looking for candidates with 3 + years of experience in : Security operations center Global SOC Experience Threat Monitoring/ Threat Detection/ Threat Prevention Any SIEM tools Interested candidates for above position kindly share your updated CV to asha.ch@peoplefy.com with below details : Notice Period : Experience: CTC : ECTC : Current Location :

Posted 2 weeks ago

Apply

8.0 - 13.0 years

15 - 27 Lacs

Gurugram

Work from Office

Naukri logo

• Strong expertise with SIEM platforms (e.g., QRadar, Sentinel, LogRhythm , Splunk,). • Proficient in EDR and XDR tools (e.g., CrowdStrike, SentinelOne, Carbon Black).

Posted 2 weeks ago

Apply

15.0 - 20.0 years

12 - 16 Lacs

Bengaluru

Work from Office

Naukri logo

Project Role : Security Delivery Lead Project Role Description : Leads the implementation and delivery of Security Services projects, leveraging our global delivery capability (method, tools, training, assets). Must have skills : Security Delivery Governance Good to have skills : Identity Access Management (IAM), Security Information and Event Management (SIEM) Minimum 15 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Delivery Lead, you will lead the implementation and delivery of Security Services projects, leveraging our global delivery capability (method, tools, training, assets). Roles & Responsibilities: Expected to be a SME with deep knowledge and experience. Should have Influencing and Advisory skills. Responsible for team decisions. Engage with multiple teams and contribute on key decisions. Expected to provide solutions to problems that apply across multiple teams. Lead and manage the Security Delivery team effectively. Develop and implement Security Delivery Governance strategies. Collaborate with cross-functional teams to ensure successful project delivery. Professional & Technical Skills: Must To Have Skills: Proficiency in Security Delivery Governance. Good To Have Skills: Experience with Identity Access Management (IAM), Security Information and Event Management (SIEM). Strong understanding of security principles and best practices. Experience in developing and implementing security policies and procedures. Knowledge of regulatory compliance requirements related to security. Excellent communication and leadership skills. Additional Information: The candidate should have a minimum of 15 years of experience in Security Delivery Governance. This position is based at our Bengaluru office. A 15 years full time education is required. Qualification 15 years full time education

Posted 2 weeks ago

Apply

5.0 - 10.0 years

7 - 12 Lacs

Bengaluru

Work from Office

Naukri logo

Project Role : Application Tech Support Practitioner Project Role Description : Act as the ongoing interface between the client and the system or application. Dedicated to quality, using exceptional communication skills to keep our world class systems running. Can accurately define a client issue and can interpret and design a resolution based on deep product knowledge. Must have skills : Splunk Administration Good to have skills : Splunk Enterprise Architecture and Design Minimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As an Application Tech Support Practitioner, you will act as the ongoing interface between the client and the system or application. You will be dedicated to quality, using exceptional communication skills to keep our world-class systems running. With your deep product knowledge, you will accurately define a client issue and interpret and design a resolution. Your typical day will involve providing ongoing support to clients, troubleshooting issues, and ensuring the smooth functioning of the system or application. Roles & Responsibilities: Expected to be an SME, collaborate and manage the team to perform. Responsible for team decisions. Engage with multiple teams and contribute on key decisions. Provide solutions to problems for their immediate team and across multiple teams. Ensure effective communication with clients to understand their issues and provide timely resolutions. Troubleshoot and resolve technical issues related to the system or application. Collaborate with cross-functional teams to identify and implement improvements to enhance system performance. Stay updated with the latest industry trends and technologies to provide proactive support and recommendations. Professional & Technical Skills: Must To Have Skills:Proficiency in Splunk Administration. Good To Have Skills:Experience with Splunk Enterprise Architecture and Design. Strong understanding of system and application support principles. Experience in troubleshooting and resolving technical issues. Knowledge of ITIL processes and best practices. Excellent communication and interpersonal skills to effectively interact with clients and cross-functional teams. Additional Information: The candidate should have a minimum of 5 years of experience in Splunk Administration. This position is based at our Bengaluru office. A 15 years full-time education is required. Qualifications 15 years full time education

Posted 2 weeks ago

Apply

5.0 - 10.0 years

16 - 20 Lacs

Bengaluru

Work from Office

Naukri logo

Support DFT on multiple types of projects in multiple design centers and apply innovative DFT techniques and affect the content of forthcoming CPU, GPU, ML and systems IP, SOCs some years before they appear in mainstream products. This candidate will contribute to DFT methodology by crafting flows, evaluating tool capabilities, helping other specialists on projects, detailing work through documentation, working with EDA vendors and propagating DFT methodologies. This position may also include meeting with customers for DFT training or to address DFT concerns. The candidate will be the first recruit in the DFT methodology group in Bangalore and will be responsible for leading the team in bangalore. Required Skills And Experience: This role is for a Principal DFT engineer with 15 years plus experience Technical leadership in DFT and ability to train/work with junior team members Experience with Perl, TCL, and/or python with ability to build and deploy generic DFT flows Proficient in Unix/Linux environments One or more core DFT skills are considered crucial for this position including some of the following Knowledge of at-speed testing, test insertion and test coverage assessment, test pattern development, scan compression, Memory BIST, Logic BIST, JTAG, IJTAG, fault simulation, debug, verification, SSN, designing and conducting experiments/tool evaluations. Experience with Siemens, Cadence and/or Synopsys DFT tools Qualified candidates will have a university degree (or equivalent) in Electronic Engineering, Computer Engineering, or other relevant technical subject area. Nice To Have Skills and Experience : Familiarity with IEEE standards such as 1500, 1149.1, 1687 and 1838 Familiarity with supporting silicon into volume production Knowledge of SSN and 3DIC Gained some exposure to digital ASIC frontend and backend design verification processes Hands-on Synthesis and Static Timing Analysis (STA) experience Familiarity with SOC architectures (Auto/Infrastructure/Client) and low power design practices would be an advantage Understanding of Functional Safety as it applies to DFT Working knowledge of Siemens MBIST and LBIST tools Exposure to simulation and formal verification tools Exposure to AI tools for execution Exposure Arm MBIST interface In Return You will be provided with the training and environment to succeed in this role. As we'll as a friendly and high-performance working environment, Arm offers a competitive benefits package including private medical insurance, sabbatical, supplementary pension, and we'llness benefits. We are offering a hybrid approach to home and office working to provide an adaptable experience for all employees and to promote a strong collaborative environment.

Posted 2 weeks ago

Apply

5.0 - 8.0 years

12 - 16 Lacs

Chennai

Work from Office

Naukri logo

An experienced security analyst who can independently monitor, analyze, and respond to security incidents They possess a deeper understanding of security tools, technologies, and threat landscapes compared to L1 analysts L2 analysts are capable of conducting more complex investigations, threat hunting, and contributing to the improvement of security processes They often act as mentors to L1 analysts and assist in incident escalation and resolution Additional Skills: SOC, DFIR,IR,Vulnerablity management , pentesting

Posted 2 weeks ago

Apply

4.0 - 7.0 years

14 - 19 Lacs

Bengaluru

Work from Office

Naukri logo

The focus of this role is in developing clocking strategies that meet stringent timing, power, and area constraints while managing clock distribution across the SoC. THE PERSON: As the SoC Clock Design Lead, you will be responsible for the architecture, design, and optimization of clocking structures within complex SoCs. This position involves working closely with cross-functional teams, including RTL, physical design, power, and timing engineers, to ensure efficient and high-performance clock networks. KEY RESPONSIBILITIES: Proficiency in clock tree synthesis (CTS) and clock network optimization using tools like Synopsys FC, ICC2. Strong experience in static timing analysis (STA), clock domain crossing (CDC) checks, and jitter/skew analysis. In-depth knowledge of clock gating, power optimization, and low-power design techniques. Strong scripting skills in Tcl, Perl, or Python for automation and flow enhancements Familiarity with advanced technology nodes (5nm and below) and their specific challenges in clock design Understanding of signal integrity, electromigration, and power integrity in the context of clock networks. PREFERRED EXPERIENCE: Define and implement the clock architecture and distribution strategy for SoCs, optimizing for performance, area, and power requirements. Lead clock tree synthesis, insertion, and optimization to achieve timing closure and reduce clock skew/jitter across the SoC. Implement and validate clock gating techniques to minimize dynamic power consumption and enhance SoC energy efficiency Work with RTL, timing, power, and PD teams to resolve clock-related issues, optimize clock distribution, and ensure alignment with SoC design goals Create and maintain custom scripts in Perl, Python, or Tcl to automate clocking tasks, streamline workflows, and improve productivity ACADEMIC CREDENTIALS: Bachelors or Masters degree in computer engineering/Electrical Engineering.

Posted 2 weeks ago

Apply

8.0 - 13.0 years

15 - 25 Lacs

New Delhi, Faridabad, Gurugram

Work from Office

Naukri logo

Strong expertise with SIEM platforms (e.g., QRadar, Sentinel, LogRhythm , Splunk,). Proficient in EDR and XDR tools (e.g., CrowdStrike, SentinelOne, Carbon Black). Hands-on knowledge of packet capture analysis tools (e.g., Wireshark, tcpdump), forensic tools, and malware analysis tools. Familiarity with scripting or automation languages such as Python, PowerShell, or Bash. Deep understanding of networking protocols, OS internals (Windows/Linux), and security best practices. Familiar with frameworks such as MITRE ATT&CK, NIST, and the Cyber Kill Chain. Minimum of nine (9) years technical experience 7+ years of experience in SOC, security operations, cyber technical analysis, threat hunting, and threat attribution assessment with increasing responsibilities. 3+ years of rule development and tuning experience 2+ years of Incident response Experience supporting 24x7x365 SOC operations and willing to operate in Shifts including but not limited to Alert and notification activities- analysis/triage/response, Review and action on Threat Intel for IOCs and other operationally impactful information, initial review and triage of reported alerts and Incidents. Manage multiple tickets/alerts in parallel, including end-user coordination. Demonstrated ability to evaluate events (through a triage process) and identify appropriate prioritization for response. Solid understanding and experience analyzing security events generated from security tools and devices not limited to QRadar, MS Sentinel, FireEye, Elastic, SourceFire, Malware Bytes, CarbonBlack/Bit9, Splunk, Prisma Cloud/Compute, Cisco IronPort, BlueCoat Experience and solid understanding of Malware analysis Demonstrated proficiencies with one or more toolsets such as QRadar, MS Sentinel, Bit9/CarbonBlack, Endgame, FireEye HX / CM / ETP, Elastic Kibana Experience and ability to use, contribute, develop and follow Standard Operating Procedures (SOPs) In-depth experience with processing and triage of Security Alerts from multiple sources but not limited to: Endpoint security tools, SIEM, email security solutions, CISA, Threat Intel Sources Experience with scripting languages applied to SOC operations; for example, automating investigations with tools, automating IOC reviews, support SOAR development. Experience with bash, python, and Windows PowerShell scripting Demonstrated experience with triage and resolution of SOC tasks, including but not limited to vulnerability announcements, phishing email review, Tier 1 IR support, SIEM/Security Tools - alert analysis. Demonstrated experience and understanding of event timeline analysis and correlation of events between logs sources. Demonstrated experience with the underlying logs generated by operating systems (Linux/Windows), Network Security Devices, and other enterprise tools. Demonstrated proficiencies with an enterprise SIEM or security analytics solution, including the Elastic Stack or Splunk. Solid understanding and experience analyzing security events generated from security tools and devices not limited to: QRadar, MS Sentinel, Carbon Black, FireEye, Palo Alto, Cylance, and OSSEC Expert in security incident response processes

Posted 2 weeks ago

Apply

12.0 - 17.0 years

45 - 50 Lacs

Gurugram

Hybrid

Naukri logo

Experience: 12+ years of experience in Security Domain At least 5+ experience in managing and leading a global security operation centre. Prior experience of 5+ years in handling a team of at least 10 people Essential capabilities: Excellent understanding and experience with: Running and improving mature security operations centres Team leadership with energy and passion Managing operational teams Working in large/complex environments Demonstrated ability to stay calm and lead under pressure Excellent verbal and written communication skills Excellent time management and prioritisation skills Excellent consulting and stakeholder management Excellent coaching, leadership and soft skills Demonstrated ability to influence Demonstrated willingness to engage in self-learning or security research outside of standard business hours Strong analytical, problem solving and lateral thinking skills Excellent subject-matter and technical skills: incident response methodologies and techniques detection and mitigation strategies for a broad range of cyber threats, including malware, DDOS, hacking, phishing, lateral movement and data exfiltration common cloud platforms/technologies, such as Azure, AWS and Google cloud common enterprise technologies, such as Windows, Linux, Active Directory, DNS, DHCP, web proxies, SMTP, TCP/IP, AWS, Azure operational usage of common analysis and response tooling performing penetration testing, including network, infrastructure and application exploitation and exploit development NIST framework MITRE ATT&CK, Lockheed Martin Cyber Kill Chain or similar methodologies Interested Candidates can share their Updated Resume at [pooja.sharma@black-turtle.co.in]

Posted 2 weeks ago

Apply

6.0 - 11.0 years

8 - 12 Lacs

Hyderabad

Work from Office

Naukri logo

Notice Period: Immediate Employment Type: Contract Job Description : 6 years of SIEM, or SOC experience Strong communication, written, and verbal skills Experience with writing/creation of formal documentation such as reports, slide decks, and architecture diagrams Customer service/support experience Ability to conduct in-depth forensic analytical studies and investigations Role Preferences Splunk certification Coding or scripting experience Strong knowledge of Unix/Linux Security+, GIAC, SSGB, ITIL, or similar certification Working knowledge of applicable industry controls such as NIST 800-536 or Mitre Attack Framework

Posted 2 weeks ago

Apply

1.0 - 4.0 years

3 - 6 Lacs

Noida

Work from Office

Naukri logo

Strong hands-on experience with one or more EDR platforms (e.g., CrowdStrike Falcon, SentinelOne, Microsoft Defender for Endpoint, Sophos Intercept X, Trend Micro Apex One). Knowledge of MITRE ATT&CK framework and threat detection techniques. Familiarity with malware analysis, endpoint forensics, and log analysis. Experience with SIEM platforms (e.g., Splunk, QRadar, LogRhythm) for correlation and alerting. Scripting knowledge (PowerShell, Python, Bash) for automation and custom detection. Understanding of endpoint operating systems (Windows, macOS, Linux) and their security internals. Familiarity with enterprise IT infrastructure, Active Directory, and networking basics. Experience with ticketing and incident management tools (e.g., ServiceNow, JIRA). Understanding of compliance standards . Deploy, configure, monitor, and maintain EDR solutions (e.g., CrowdStrike, Microsoft Defender for Endpoint, SentinelOne, Carbon Black, etc.). Monitor endpoint security alerts and respond to threats in real-time. Analyze EDR telemetry to detect suspicious behavior, malware, and advanced persistent threats (APTs). Investigate endpoint security incidents and support root cause analysis. Develop and maintain detection rules, playbooks, and automation scripts. Collaborate with SOC and incident response teams for coordinated threat mitigation. Conduct regular health checks, patching, and performance tuning of EDR agents. Generate and present technical reports, dashboards, and incident summaries. Provide guidance on endpoint security best practices to IT and end users. Support audits and compliance efforts by ensuring endpoint security controls are in place. Participate in cyber drills and contribute to continuous improvement of the incident response process.

Posted 2 weeks ago

Apply

2.0 - 3.0 years

4 - 5 Lacs

Chennai

Work from Office

Naukri logo

Lennox (NYSE: LII) Driven by 130 years of legacy, HVAC and refrigeration success, Lennox provides our residential and commercial customers with industry-leading climate-control solutions. At Lennox, we win as a team, aiming for excellence and delivering innovative, sustainable products and services. Our culture guides us and creates a workplace where all employees feel heard and welcomed. Lennox is a global community that values each team member s contributions and offers a supportive environment for career development. Come, stay, and grow with us. Job Description Monitor all the endpoint , Network , Cloud and application security incidents. As SOC team member , perform the basic investigation and all the security incidents and document the evidence. Performing Security controls health & Compliance check. Adhere to shift timings and provide uninterrupted 24/7 monitoring . Properly share shift handovers, updating the next shift on ongoing incidents and activities. Respond to all security incidents within a SLA period Resolve incidents assigned to the shift promptly and escalate to the Senior team when necessary. Work across all categories of incidents without limiting to specific types. Follow the incident handling as per the docum ented SOP . Complete and close all assigned task requests within SLA timelines. Attend weekly and monthly team meetings as mandatory. Qualifications OSINT : knowledge about open-source platforms for analyzing URL, IP Addresses , suspicious files. Email Analysis : Operating Systems: Basics of Linux and Windows, kernel concepts, and system differences. Networking: OSI model, TCP/IP, firewalls, VPNs, proxies, IP addressing, and subnetting. SIEM Tools: Basics of SIEM operations, alerts, and dashboards (e.g., Splunk). Authentication & Access Control: MFA, SSO, and password management best practices. Malware Protection: Antivirus strategies, malware analysis, phishing email analysis, and IOC gathering. Trending Cyber Attacks : update knowledge about the trending cyber-attacks & its attack patterns .

Posted 2 weeks ago

Apply

2.0 - 5.0 years

4 - 7 Lacs

Hyderabad

Work from Office

Naukri logo

ROLES & RESPONSIBILITIES Reviews alerts generated by SentinelOne and implements appropriate containment and mitigation measures Proficient in SIEM, with a focus on QRadar SIEM, as well as threat monitoring and hunting within SIEM environments. Analyzes payloads using JoeSandbox and escalates to the appropriate team as necessary Collaborates with the Forensics team to conduct threat hunting using identified Indicators of Compromise (IoCs) and Tactics, Techniques, and Procedures (TTPs) Assists the Tiger Team in targeted collections of systems based on identified malicious activities in the clients environment Conducts historical log reviews to support threat hunting efforts and ensures all malicious artifacts are mitigated in the SentinelOne console Examines client-provided documents and files to supplement the SOC investigation and mitigation strategy Conducts perimeter scans of client infrastructure and reports any identified vulnerabilities to the Tiger Team for appropriate escalation Manages client-related tasks within the ConnectWise Manage ticketing system as part of the Client Handling Lifecycle Creates user accounts in SentinelOne console for the client Generates Threat Reports showcasing activity observed within the SentinelOne product Executes passphrase exports as needed for client offboarding Submits legacy installer requests to ensure the team is properly equipped for deployment Provides timely alert notifications to the IR team of any malicious activity impacting our clients Assists with uninstalling/migrating SentinelOne Generates Ranger reports to provide needed visibility into client environments Manages and organizes client assets (multi-site and multi-group accounts) Applies appropriate interoperability exclusions relating to SentinelOne and client applications Performs SentinelOne installation / interoperability troubleshooting as needed Contributes to the overall documentation of SOC processes and procedures Participates in Handler on Duty (HOD) shifts as assigned to support the TT client matters Internally escalates support ticket / alerts to Tier II-IV Analysts as needed May perform other duties as assigned by management SKILLS AND KNOWLEDGE Demonstrated knowledge of Windows and Unix operating systems Thorough understanding of Digital Forensics and Incident Response practices Proficiency in advanced analysis techniques for processing and reviewing large datasets in various formats Familiarity with TCP/IP and OSI Model concepts at a basic level Expertise in the Incident Response Life Cycle stages (Preparation, Identification, Containment, Eradication, Recovery, and Lessons Learned) Working knowledge of the MITRE ATT&CK framework at an intermediate level Proven ability to work independently and solve complex problems with little direction from management Highly detail-oriented and committed to producing quality work JOB REQUIREMENTS Associate s degree and 6+ years of IT related experience or Bachelor s Degree and 2-5 years related experience Current or previous knowledge of, or previous experience with, Endpoint Detection and Response (EDR) toolsets General knowledge of the Incident Handling Lifecycle Ability to communicate in both technical and non-technical terms both oral and written DISCLAIMER The above statements are intended to describe the general nature and level of work being performed. They are not intended to be an exhaustive list of all responsibilities, duties and skills required personnel so classified. WORK ENVIRONMENT While performing the responsibilities of this position, the work environment characteristics listed below are representative of the environment the employee will encounter: Usual office working conditions. Reasonable accommodation may be made to enable people with disabilities to perform the essential functions of this job. PHYSICAL DEMANDS No physical exertion required Travel within or outside of the state Light work: Exerting up to 20 pounds of force occasionally, and/or up to 10 pounds of force as frequently as needed to move objects TERMS OF EMPLOYMENT Salary and benefits shall be paid consistent with Arete salary and benefit policy. FLSA OVERTIME CATEGORY Job is exempt from the overtime provisions of the Fair Labor Standards Act. DECLARATION The Arete Incident Response Human Resources Department retains the sole right and discretion to make changes to this job description. EQUAL EMPLOYMENT OPPORTUNITY We re proud to be an equal opportunity employer- and celebrate our employees differences, regardless of race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or Veteran status. Different makes us better. #LI Arete Incident Response is an outstanding (and growing) company with a very dedicated, fun team. We offer competitive salaries, fully paid benefits including Medical/Dental, Life/Disability Insurance, 401(k) and the opportunity to work with some of the latest and greatest in the fast-growing cyber security industry. When you join Arete You ll be doing work that matters alongside other talented people, transforming the way people, businesses, and things connect with each other. Of course, we will offer you great pay and benefits, but we re about more than that. Arete is a place where you can craft your own path to greatness. Whether you think in code, words, pictures or numbers, find your future at Arete, where experience matters. Equal Employment Opportunity We re proud to be an equal opportunity employer- and celebrate our employees differences, regardless of race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or Veteran status. Different makes us better.

Posted 2 weeks ago

Apply

2.0 - 7.0 years

11 - 15 Lacs

Bengaluru

Work from Office

Naukri logo

Lead the architecture, design and development of Processor Core Front end of pipeline units for high-performance IBM Systems. - Architect and design I-Cache, Instruction Fetch, Branch Prediction and Decode units of a high performance processor CPU - Develop the features, present the proposed architecture in the High level design discussions - Estimate the overall effort to develop the feature. - Estimate silicon area and wire usage for the feature. - Develop micro-architecture, Design RTL, Collaborate with other Core units, Verification, DFT, Physical design, Timing, FW, SW teams to develop the feature - Signoff the Pre-silicon Design that meets all the functional, area and timing goals - Participate in post silicon lab bring-up and validation of the hardware - Lead a team of engineers, guide and mentor team members, represent as Logic Design Lead in global forums Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise 8 or more years of demonstrated experience in architecting and designing specific CPU unit(eg. I-Cache, Instruction Fetch, Branch Prediction, Instruction Decode) - Hands on experience of different Branch Prediction techniques - Deep expertise in Out of Order, Super Scalar, Multi-Threaded Core Architecture and ISA - Experience with high frequency, instruction pipeline designs - At least 1 generation of Processor Core silicon bring up experience - In depth understanding of industry microprocessor designs (e.g., x86, ARM, or RISC-V processor designs) - Proficiency of RTL design with Verilog or VHDL - Knowledge of at least one object oriented or functional programming language and scripting language. - Nice to haves - Knowledge of instruction decode and handling pipeline hazards - Knowledge of verification principles and coverage - High-level knowledge of Linux operating system - Understanding of Agile development processes - Experience with DevOps design methodologies and tools Preferred technical and professional experience Master's Degree/PhD

Posted 2 weeks ago

Apply

6.0 - 9.0 years

5 - 11 Lacs

Hyderabad, Chennai

Hybrid

Naukri logo

Hiring for SOC Analyst in one of our Top Banking company @ Chennai & Hyderabad location Job Title: SOC Analyst Experience : 6 - 9 Years Department: Cybersecurity / Information Security Location: Chennai & Hyderabad Employment Type: Hybrid Mode - 3 days WFO and 2 days WFH . Job Summary: We are seeking a skilled and detail-oriented Security Operations Center (SOC) Analyst to join our cybersecurity team. The SOC Analyst will be responsible for monitoring, detecting, analyzing, and responding to cybersecurity incidents using a variety of tools and techniques. This role is critical to maintaining and improving our organization's security posture by ensuring real-time threat detection and incident response. Key Responsibilities: Monitor security alerts and events from SIEM tools (e.g., Splunk, QRadar, Microsoft Sentinel). Analyze and triage events to determine impact and severity. Investigate security incidents and provide incident reports with detailed analysis. Escalate validated threats and vulnerabilities to the appropriate teams and assist in mitigation efforts. Coordinate with IT teams to ensure containment, eradication, and recovery actions are taken for confirmed incidents. Perform threat intelligence analysis to support proactive detection and defense. Document incident handling procedures and maintain an incident knowledge base. Participate in continuous improvement of SOC operations, including playbooks and automation. Stay current on the latest cybersecurity trends, threats, and tools. Required Qualifications: Bachelor's degree in Computer Science, Information Security, or a related field; or equivalent work experience. 13 years of experience in a SOC or information security role. Experience with SIEM platforms, IDS/IPS, firewalls, and endpoint protection tools. Understanding of TCP/IP, DNS, HTTP, VPN, and network protocols. Knowledge of common threat vectors, MITRE ATT&CK framework, and kill chain. Strong analytical and problem-solving skills. Excellent communication skills and ability to work under pressure. Preferred Qualifications: Certifications such as CompTIA Security+, CEH, GCIA, GCIH, or Splunk Certified Analyst. Experience with scripting (e.g., Python, PowerShell) for automation. Familiarity with cloud security monitoring (e.g., AWS GuardDuty, Azure Defender). Exposure to incident response frameworks and forensic tools. Work Schedule: [24x7 shift-based / Regular business hours / On-call rotation as applicable]

Posted 2 weeks ago

Apply

5.0 - 10.0 years

9 - 13 Lacs

Bengaluru

Work from Office

Naukri logo

Responsibilities: Build and guide a team of DFT engineers to deliver the architecture and the DFT deliveries towards SOC development. Engage with the RTL & physical design program management to plan and execute the DFT deliveries. Work with cross-functional teams (e.g., design, verification, test engineering) to integrate DFT features effectively. Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise : At least 10+ years of experience in DFT implementation / methodology Strong understanding of digital design and test principles. Proficiency in DFT techniques, such as scan insertion, BIST, and Automatic Test Pattern Generation (ATPG), MBIST insertion Experience with EDA tools , Synopsys and Cadence &scripting languages (e.g., Python, TCL). Knowledge of IC design flows, verification tools, and fault models Ability to identify, analyze, and resolve testing challenges. Work effectively within multidisciplinary teams, communicating complex technical details clearly. Ensure thorough testing, comprehensive fault coverage, and alignment with industry standards. Technically lead/managed 10 - 15 DFT engineers to deliver DFT implementation on SOC Preferred technical and professional experience NA

Posted 2 weeks ago

Apply

4.0 - 8.0 years

6 - 10 Lacs

Kolkata, Mumbai, New Delhi

Work from Office

Naukri logo

Bachelor s degree in computer science, Information Security, orrelated field 7+ years of experience in security engineering, cloud security, or compliance Strong knowledge of cloud security concepts, principles, and practices Familiarity with cloud security best practices and frameworks (e.g., CISv8, NIST, ISO, CSA) Experience in creating and maintaining security documentation, such as policies, standards, procedures, and guidelines. Experience with tool sets relevant to modern cloud operations like SIEM, WAF, vulnerability scans, pen tests, CIS benchmarking, etc. Working knowledge of OWASP Web/API vulnerabilities (CSRF, XSS, SQLI, etc.) and compensating controls. Knowledge of Web/API security architecture common authentication and authorization technologies (OIDC, OAuth2, Spring Security, HMAC, WS-Security, WS-Trust). Solid understanding of applied cryptography fundamentals (Encryption, Authentication, Symmetric Cryptography, Asymmetric Cryptography etc.). Ability to translate complex technical concepts into clear and concise language for diverse audiences and Attention to detail with quality assurance. Hands-on experience with security tools, frameworks for cloud platforms (e.g., AWS, Azure, GCP) and technologies (e.g., firewalls, encryption, identity and access management, vulnerability scanning, penetration testing) Experience with security standards and regulations for cloud environments (e.g., ISO 27001, SOC 2, PCI DSS, HIPAA, GDPR) Experience with scripting languages (e.g., Python, Bash, PowerShell) Excellent communication, collaboration, and problem-solving skills Certifications in cloud security or compliance (e.g., AWS Certified Security Specialty, Azure Security Engineer, CCSK, CCSP) are Mandatory. Basic Requirements - Effective verbal and non-verbal communication skills at all levels of the organization - Leadership teamwork and collaboration - Discretion - Problem solving - Critical Thinking - Self-initiated/sufficient - Motivated

Posted 2 weeks ago

Apply

Exploring SOC Jobs in India

The job market for Security Operations Center (SOC) professionals in India is thriving with the increasing demand for cybersecurity experts. SOC jobs involve monitoring, detecting, and responding to security incidents to protect organizations from cyber threats. If you are considering a career in cybersecurity, exploring SOC roles in India can be a rewarding option.

Top Hiring Locations in India

  1. Bangalore
  2. Pune
  3. Hyderabad
  4. Delhi/NCR
  5. Mumbai

These cities are known for their strong presence of IT and cybersecurity companies actively seeking SOC professionals.

Average Salary Range

The average salary range for SOC professionals in India varies based on experience and expertise. Entry-level SOC analysts can expect to earn around INR 4-6 lakhs per annum, while experienced SOC managers or consultants can command salaries ranging from INR 12-20 lakhs per annum.

Career Path

In the SOC field, a typical career progression may include roles such as SOC Analyst, SOC Engineer, SOC Team Lead, SOC Manager, and eventually Chief Information Security Officer (CISO). Advancing through these roles often involves gaining experience, acquiring relevant certifications, and developing strong analytical and problem-solving skills.

Related Skills

Besides expertise in SOC operations, professionals in this field are expected to have knowledge of network security, incident response, threat intelligence, and cybersecurity tools. Proficiency in programming languages like Python, knowledge of SIEM (Security Information and Event Management) tools, and familiarity with compliance standards such as GDPR and ISO 27001 can also be beneficial.

Interview Questions

  • What is the difference between a security incident and a security event? (basic)
  • Explain the purpose of a SIEM tool in a SOC environment. (medium)
  • How would you investigate a potential security breach in a network? (medium)
  • Describe the steps involved in a typical incident response process. (medium)
  • What is the role of threat intelligence in a SOC? (basic)
  • How do you stay updated with the latest cybersecurity threats and trends? (basic)
  • Can you explain the concept of Indicators of Compromise (IoC)? (medium)
  • What is the significance of log analysis in cybersecurity? (basic)
  • How would you prioritize security alerts in a busy SOC environment? (medium)
  • Have you worked with any specific security frameworks like NIST or MITRE ATT&CK? (advanced)
  • ...

Closing Remark

As you navigate the SOC job market in India, remember to continuously enhance your skills, stay updated with industry trends, and showcase your passion for cybersecurity. With dedication and preparation, you can confidently pursue rewarding opportunities in this dynamic field. Good luck in your job search!

cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies