Security Operations Center Analyst

2 days ago


New Delhi, India Valorant Full time

Role Summary We are seeking an experiencedL1 SOC Analyst (3–5 years)to perform real-timeEyes on Glassmonitoring and first-level incident triage within our Security Operations Center. The role requires hands-on experience with SIEM, EDR, DLP, and network security tools, strong analytical skills, and a disciplined approach to SOP-driven incident handling. You will be the first line of defense responsible for validating threats, escalating incidents, and ensuring timely response to security events.Key Responsibilities 1. Real-Time Monitoring (Eyes on Glass) Continuous monitoring of security events across SIEM platforms such asAzure Sentinel, Splunk ES, Google SecOps (formerly Chronicle), QRadar . Identify anomalies, suspicious behavior, and early indicators of compromise. Maintain situational awareness of enterprise threat posture during the shift. 2. Alert Triage & Incident Escalation (L1 Scope) Perform initial triage of alerts related to malware, phishing, endpoint anomalies, lateral movement, access abuse, and network-based threats. Differentiate true positives from false positives through log correlation and event validation. Escalate verified incidents to L2/L3 teams as per incident playbooks and SLAs. Document investigations thoroughly withinServiceNow, Jira, Freshservice , or similar ITSM systems. 3. Endpoint & Network Security Support Monitor and respond to signals from EDR tools such asCrowdStrike, Carbon Black, Microsoft Defender . Review firewall, IDS/IPS, and proxy logs (Palo Alto, Fortinet, Cisco, Snort/Suricata). Support initial containment steps under supervision—isolating endpoints, blocking malicious domains/IPs, disabling accounts, etc. 4. DLP, Access & Cloud Security Oversight Monitor DLP alerts viaForcepoint, Microsoft Purview , or equivalent solutions. Validate RBAC violations, privilege escalations, and suspicious access attempts. Review cloud-specific alerts inAzure Security Center , API security dashboards, and identity protection tools. 5. Reporting, Compliance & Documentation Prepare incident summaries, shift handover reports, and event logs with clear timelines and evidence. Follow SOPs aligned to compliance frameworks such asISO 27001, HIPAA, GDPR . Participate in monthly/quarterly reporting related to SOC performance, incident trends, and false positive reduction. 6. Continuous Improvement Contribute to SIEM rule tuning, alert optimization, and detection enhancements. Support development of SOC playbooks, detection use cases, and knowledge-base content. Stay current with threat landscapes, MITRE ATT&CK techniques, malware trends, and cloud security patterns.Required Skills & Competencies 1. Technical Skills Hands-on experience with SIEM platforms:Splunk ES, Azure Sentinel, Google SecOps (Chronicle), QRadar . Strong understanding of EDR tools:CrowdStrike, Carbon Black, Microsoft Defender . Exposure to DLP tools such asForcepoint , Microsoft DLP, or Symantec DLP. Familiarity with: IDS/IPS systems Firewall logs & network telemetry RBAC, access control & authentication mechanisms Malware/phishing analysis basics Cloud security fundamentals (Azure preferred) 2. Soft Skills Strong analytical mindset and attention to detail. Effective communication skills for escalation and reporting. Ability to work in a 24x7 SOC with high operational discipline. Team player with strong documentation habits.Experience & Qualifications 3–5 yearsof hands-on experience in SOC operations, security monitoring, or incident response. Bachelor’s degree in Computer Science, Information Security, or related field. Preferred certifications:SC-200, AZ-900, Security+, CySA+, CEH .



  • New Delhi, India Tata Consultancy Services Full time

    We await your innovation at TCS: Hiring |Security Operations Center Analyst|Greetings from TCS!!Required Total Experience: 5+ yearsWork location: Hyderabad, Bangalore.Required Technical Skill Set:- 5–8 years of SOC or relevant cybersecurity experience, preferably with time in a L2 SOC role - Required Skills Proficiency with SIEM tools (Splunk, QRadar, or...


  • New Delhi, India UST Full time

    Dear Candidates,UST is looking for a L2 SOC Analyst with atleast 5 years of exp.equired Experience : 5+ YearsNP : Immediate to 15 days onlyLocation: Trivandrum, Kochi, Bangalore, ChennaiInterested candidate can share your updated CV to JD As a SOC L2 Analyst, the candidate will serve as a senior member of the Security Operations Center, responsible for...


  • New Delhi, India T&M Services Consulting Pvt Ltd Full time

    1)AI & Automation Lead – SOC - Cyber Warfare/ Cyber Defense (7 Years+) The AI & Automation Lead is responsible for making Security Operations Centers (SOCs) smarter, faster, and more efficient usingAI, GenAI, and automationtechnologies. The role focuses on improving incident response, meeting SLAs, and scaling security operations globally using platforms...


  • New Delhi, India T&M Services Consulting Pvt Ltd Full time

    1)AI & Automation Lead – SOC - Cyber Warfare/ Cyber Defense (7 Years+) The AI & Automation Lead is responsible for making Security Operations Centers (SOCs) smarter, faster, and more efficient usingAI, GenAI, and automationtechnologies. The role focuses on improving incident response, meeting SLAs, and scaling security operations globally using platforms...


  • Delhi, Delhi, India airtel Full time

    Job Summary:The Security Operations Center (SOC) Security Analyst serves in a SOC team, is responsible for conducting information security investigations as a result of security incidents identified by the Level-1 security analysts who are monitoring the security consoles from various SOC entry channels (SIEM, Tickets, Email and Phone).The SOC Security...


  • Delhi, India, India Airtel Digital Full time

    Job Summary: The Security Operations Center (SOC) Security Analyst serves in a SOC team, is responsible for conducting information security investigations as a result of security incidents identified by the Level-1 security analysts who are monitoring the security consoles from various SOC entry channels (SIEM, Tickets, Email and Phone). The SOC Security...


  • New Delhi, India airtel Full time

    Role Overview Seeking a skilled and motivated L1/L2 Analyst – Dark Web Monitoring & Threat Intelligence to join our Security Operations Center (SOC) team. In this role, the analyst will focus on dark web intelligence gathering, analysis, and reporting, leveraging platforms such as CloudSEK to identify potential threats, data leaks, credential exposures,...


  • New Delhi, India Etenico Technologies Full time

    Responsibilities: As a SOC L3 Analyst, you will be responsible for leading the investigation and response to complex security incidents, engineering advanced detection content, and optimizing security tools and processes. With a strong focus on Splunk, content engineering, Endpoint Detection and Response (EDR), and Security Orchestration, Automation, and...


  • Delhi, India Valorant Full time

    Role SummaryWe are seeking an experiencedL1 SOC Analyst (3–5 years)to perform real-timeEyes on Glassmonitoring and first-level incident triage within our Security Operations Center. The role requires hands-on experience with SIEM, EDR, DLP, and network security tools, strong analytical skills, and a disciplined approach to SOP-driven incident handling. You...


  • Delhi, India Valorant Full time

    Role SummaryWe are seeking an experiencedL1 SOC Analyst (3–5 years)to perform real-timeEyes on Glassmonitoring and first-level incident triage within our Security Operations Center. The role requires hands-on experience with SIEM, EDR, DLP, and network security tools, strong analytical skills, and a disciplined approach to SOP-driven incident handling. You...