SOC Analyst
5 days ago
Join Verdantas – A Top #ENR 81 FirmWe at Verdantas, seeking for skilled and motivated Microsoft Sentinel SIEM Engineer to join our dynamic cybersecurity team. In this role, you will be responsible for the end-to-end management, optimization, and advanced configuration of our Microsoft Sentinel SIEM and Microsoft 365 Defender platform. You will play a critical role in protecting our digital assets by designing and implementing detection rules, automating response actions, and hunting for advanced threats. The ideal candidate is a proactive problem-solver with deep technical expertise in the Microsoft security ecosystem and a passion for building resilient security operations.Experience: 5+ years of hands-on experience in a security engineering or analyst role, with at least 2 years focused on Microsoft Sentinel.Key Areas: Monitoring and Maintenance Threat Detection and Analysis Automation and Orchestration Threat Hunting Incident Response Support Collaboration and Communication Continuous ImprovementKey Roles and Responsibilities Day-to-day activities of a Sentinel SIEM Expert are a mix of proactive engineering, reactive response, and strategic improvement. While an analyst might watch the queue, an expert builds and tunes the system 1. Platform Management & Administration Deployment & Configuration:Architect, deploy, and configure Microsoft Sentinel workspaces, including data connector setup, log ingestion, and workspace optimization. Data Onboarding:Manage the ingestion of log data from various sources (e.g., Microsoft 365 Defender, Azure AD, Azure Activity Logs, on-premises servers, firewalls, endpoints via Azure Arc and AMA). Health Monitoring:Proactively monitor the health, performance, and cost of the Sentinel environment. Troubleshoot and resolve issues related to data ingestion, agent health, and analytics rule execution. Lifecycle Management:Manage the lifecycle of analytics rules, watchlists, hunting queries, and workbooks.2. Threat Detection & Content Development Analytics Rule Creation:Design, develop, test, and tune custom analytics rules using Kusto Query Language (KQL) to detect malicious activity, threats, and anomalies. SOC Use Case Implementation:Translate business requirements and threat intelligence into effective, actionable detection logic within Sentinel. Leverage Built-in Templates:Utilize and customize built-in analytics rule templates from Microsoft and the community to accelerate detection coverage. Threat Intelligence Integration:Integrate threat intelligence platforms (TIP) and indicators of compromise (IOCs) into Sentinel to enhance detection capabilities.3. Automation & Response (SOAR) Playbook Development:Design, build, and maintain Azure Logic Apps playbooks to automate incident response and orchestrate security workflows (e.g., auto-quarantine emails, disable user accounts, trigger investigations). Automation Rule Management:Create and manage Automation Rules to standardize incident triage, assignment, and lifecycle (e.g., auto-close false positives, set severity levels). Efficiency Improvement:Continuously seek opportunities to automate manual SOC tasks, reducing Mean Time to Respond (MTTR) and Mean Time to Acknowledge (MTTA).4. Threat Hunting & Proactive Defense Proactive Hunting:Conduct proactive threat hunting campaigns using advanced KQL queries to uncover hidden threats that may evade traditional detection methods. Hunting Notebooks:Develop and utilize Jupyter notebooks within Sentinel for deep-dive, interactive investigations. Research & Development:Stay current with the latest adversary TTPs (Tactics, Techniques, and Procedures) and develop new hunting hypotheses.5. Investigation & Incident Support Incident Analysis:Serve as an escalation point for Tier 2/3 SOC analysts, providing expertise during complex incident investigations. Forensic Data Enrichment:Use Sentinel's investigation graph and entity pages to enrich incident data and understand the full scope of an attack. Documentation:Create and maintain detailed documentation for runbooks, playbooks, hunting guides, and standard operating procedures (SOPs).6. Collaboration & Reporting Stakeholder Reporting:Develop and maintain dashboards and workbooks to provide visibility into the security posture, key metrics (KPIs), and threat landscape for management and other stakeholders. Cross-Functional Collaboration:Work closely with the IT infrastructure, cloud, and application development teams to ensure proper logging and security best practices are followed. Mentorship:Mentor and provide technical guidance to junior SOC analysts and engineers. Act as an escalation point for Tier 2/3 SOC analysts struggling with a complex investigation. Provide a "second opinion" on the scope and impact of a potential security incident. Mentor junior engineers and analysts on KQL, Azure, and security concepts.
-
SOC Analyst
3 days ago
New Delhi, India Aguna Solutions Full timeJob Description: We are seeking an experienced and skilledSOC Analyst – Level 1to manage Security Operations Centre. As a SOC Analyst, you will play a pivotal role in managing end-to-end life cycle of managed SOC. Your expertise will drive efficiency, enhance productivity, and transform processes across our organization. As a SOC Analyst L1, you will be...
-
Soc Analyst
4 weeks ago
New Delhi, India Whatjobs IN C2 Full timeRole Overview: Seeking a skilled and motivated L1 Analyst – Dark Web Monitoring & Threat Intelligence to join our Security Operations Center (SOC) team. In this role, the analyst will focus on dark web intelligence gathering, analysis, and reporting, leveraging platforms such as CloudSEK to identify potential threats, data leaks, credential exposures, and...
-
SOC Analyst
3 days ago
New Delhi, India Aguna Solutions Full timeJob Description: We are seeking an experienced and skilledSOC Analyst – Level 2to manage Security Operations Centre. As a SOC Analyst, you will play a pivotal role in managing end-to-end life cycle of managed SOC. Your expertise will drive efficiency, enhance productivity, and transform processes across our organization. As a SOC Analyst Level 2, you will...
-
Soc Analyst
2 weeks ago
Delhi, NCR, India Airtel Full time ₹ 9,00,000 - ₹ 12,00,000 per yearManaged Services SOC ManagerJob Summary:The Security Operations Center (SOC) Security L-1 Analyst serves in a SOC team, is responsible for conducting information security investigations as a result of security incidents identified by the Level-1 security analysts who are monitoring the security consoles from various SOC entry channels (SIEM, Tickets, Email...
-
TRAINER - SOC ANALYST
4 weeks ago
New Delhi, India Full Stack Academy Full timeCompany DescriptionFull Stack Academy is dedicated to transforming recent graduates into skilled software professionals and supporting current professionals in enhancing their expertise in advanced technologies. With a team of experienced industry professionals, Full Stack Academy provides comprehensive training that combines theoretical knowledge with...
-
Soc Analyst
2 weeks ago
Delhi, NCR, Noida, India ASI Cyber Security Full time ₹ 5,00,000 - ₹ 15,00,000 per yearJD FOR SOC AnalystA SOC analyst job description for a role focused on Microsoft Sentinel includes monitoring, analyzing, and responding to security threats using Sentinel and the Microsoft Defender suite. Key responsibilities involve using Kusto Query Language (KQL) for threat hunting and investigation, creating automated incident response playbooks with...
-
SOC Analyst
6 days ago
Delhi, Delhi, India Recruin Full time ₹ 5,00,000 - ₹ 15,00,000 per yearRole Overview:Seeking a skilled and motivated L1 Analyst – Dark Web Monitoring & Threat Intelligenceto join our Security Operations Center (SOC) team.In this role, the analyst will focus on dark web intelligence gathering, analysis, andreporting, leveraging platforms such as CloudSEK to identify potential threats, dataleaks, credential exposures, and...
-
SOC Analyst L2
2 days ago
Delhi, Delhi, India Aguna Solutions Full timeWe are seeking an experienced and skilledSOC Analyst – Level 2to manage Security Operations Centre. As a SOC Analyst, you will play a pivotal role in managing end-to-end life cycle of managed SOC. Your expertise will drive efficiency, enhance productivity, and transform processes across our organization.As a SOC Analyst Level 2, you will be the first line...
-
SOC Analyst
3 days ago
New Delhi, India Verdantas Full timeJoin Verdantas – A Top #ENR 81 Firm!We at Verdantas, seeking for skilled and motivated Microsoft Sentinel SIEM Engineer to join our dynamic cybersecurity team. In this role, you will be responsible for the end-to-end management, optimization, and advanced configuration of our Microsoft Sentinel SIEM and Microsoft 365 Defender platform. You will play a...
-
Soc Analyst
2 days ago
Delhi, Delhi, India Athena Full timeExperience in SIEM ToolB.TECH or MCA with minimum 3 years of experience for L1 AnalystMinimum of 2 years of experience in SOC services through on-premises or managed mode of service provider.Minimum 2-year experience in operating a SIEM product and other security tools.Have experience in handling log management and incident management.At least one Mandatory...