Current jobs related to Soc Analyst - Bangalore City - Deloitte


  • Bangalore City, India NeST Digital Full time

    Job Description Job Location: Tokyo, Japan15 + years of experience. Requires N2 & above strong Japanese language skills. With N3 having good conversation skills can be considered Experience with SIEM tools (e. G., Splunk, IBM QRadar, Arc Sight, Splunk, Cyberreason), EDR solutions (e. G., Crowd Strike, Carbon Black), and other SOC technologies. Proficiency in...


  • bangalore, India Tata Consultancy Services Full time

    Role : SOC Securonix AnalystExperience : 4 - 10 yearsLocation : BangaloreMust Have :- Experience in SIEM tool implementation, processes definition, Use Case creation.- Hands on experience in Security Operations, SOC, SIEM, Incident Response, Automation, Cloud.- Hands-on experience working in a product integration environment. Knowledge of REST API best...


  • bangalore, India Tata Consultancy Services Full time

    Role : SOC Securonix Analyst Experience : 4 - 10 years Location : Bangalore Must Have : - Experience in SIEM tool implementation, processes definition, Use Case creation. - Hands on experience in Security Operations, SOC, SIEM, Incident Response, Automation, Cloud. - Hands-on experience working in a product integration environment. Knowledge of REST API...

  • L2 SOC Analyst

    4 weeks ago


    bangalore, India HARMAN India Full time

    Job DescriptionJob Overview – L2 SOC Analyst positionJob DescriptionResponsibilities for this role include, but are not limited to:5-8-years’ experience in SOC Tier 2 Job Profile Summary:In this position using various cybersecurity systems (EDR, SIEM, Firewall, IDS, IPS, SOAR, Access Management, Vulnerability management, etc.) you will monitor and...

  • L2 SOC Analyst

    4 weeks ago


    Bangalore, India HARMAN India Full time

    Job Description Job Overview – L2 SOC Analyst position Job Description Responsibilities for this role include, but are not limited to: 5-8-years’ experience in SOC Tier 2 Job Profile Summary: In this position using various cybersecurity systems (EDR, SIEM, Firewall, IDS, IPS, SOAR, Access Management, Vulnerability management, etc.) you will monitor...

  • L2 soc analyst

    4 weeks ago


    Bangalore, India HARMAN India Full time

    Job Description Job Overview – L2 SOC Analyst position Job Description Responsibilities for this role include, but are not limited to: 5-8-years’ experience in SOC Tier 2 Job Profile Summary: In this position using various cybersecurity systems (EDR, SIEM, Firewall, IDS, IPS, SOAR, Access Management, Vulnerability management, etc.) you will monitor...

  • Soc manager

    3 weeks ago


    Bangalore, India NeST Digital Full time

    Job Description Job Location: Tokyo, Japan 15 + years of experience. Requires N2 & above strong Japanese language skills. With N3 having good conversation skills can be considered Experience with SIEM tools (e.g., Splunk, IBM QRadar, Arc Sight, Splunk, Cyberreason), EDR solutions (e.g., Crowd Strike, Carbon Black), and other SOC technologies. ...

  • SOC Manager

    3 weeks ago


    Bangalore, India NeST Digital Full time

    Job Description Job Location: Tokyo,Japan 15 + years of experience. Requires N2 & above strong Japanese language skills. With N3 having good conversation skills can be considered Experience with SIEM tools (e.g., Splunk, IBM QRadar, ArcSight,Splunk,Cyberreason), EDR solutions (e.g., CrowdStrike, Carbon Black), and other SOC technologies. Proficiency in...

  • L2 SOC Analyst

    1 week ago


    bangalore, India HARMAN India Full time

    Job DescriptionJob Overview – L2 SOC Analyst positionJob DescriptionResponsibilities for this role include, but are not limited to:5-8-years’ experience in SOC Tier 2Job Profile Summary:In this position using various cybersecurity systems (EDR, SIEM, Firewall, IDS, IPS, SOAR, Access Management, Vulnerability management, etc.) you will monitor and analyze...

  • SOC Manager

    3 weeks ago


    bangalore, India NeST Digital Full time

    Job Description Job Location: Tokyo,Japan15 + years of experience.Requires N2 & above strong Japanese language skills. With N3 having good conversation skills can be consideredExperience with SIEM tools (e.g., Splunk, IBM QRadar, ArcSight,Splunk,Cyberreason), EDR solutions (e.g., CrowdStrike, Carbon Black), and other SOC technologies.Proficiency in log...

  • L3 soc analyst

    7 days ago


    Bangalore, India AlifCloud IT Consulting Pvt. Ltd. Full time

    Job Title: Security Operations Centre (SOC) Analyst - WFH Work type- Remote/Hybrid Job Type: Full-time Department: Information Security Reports To: SOC Manager SIEM Tools- Splunk, Azure Sentinel EDR- Defender Candidate Preferred Location: Pune India About Alif Cloud IT Consulting: Alif Cloud IT Consulting is a leading provider of...

  • L3 SOC Analyst

    6 days ago


    bangalore, India AlifCloud IT Consulting Pvt. Ltd. Full time

    Job Title: Security Operations Centre (SOC) Analyst - WFH Work type- Remote/Hybrid Job Type: Full-time Department: Information Security Reports To: SOC Manager SIEM Tools- Splunk, Azure Sentinel EDR- Defender Candidate Preferred Location: Pune India About Alif Cloud IT Consulting: Alif Cloud IT Consulting is a leading provider of Microsoft Services...

  • L3 SOC Analyst

    5 days ago


    bangalore, India AlifCloud IT Consulting Pvt. Ltd. Full time

    Job Title: Security Operations Centre (SOC) Analyst - WFH Work type- Remote/Hybrid Job Type: Full-time Department: Information Security Reports To: SOC Manager SIEM Tools- Splunk, Azure Sentinel EDR- Defender Candidate Preferred Location: Pune India About Alif Cloud IT Consulting: Alif Cloud IT Consulting is a leading provider of Microsoft Services...

  • L3 SOC Analyst

    3 days ago


    bangalore, India AlifCloud IT Consulting Pvt. Ltd. Full time

    Job Title: Security Operations Centre (SOC) Analyst - WFHWork type- Remote/HybridJob Type: Full-timeDepartment: Information SecurityReports To: SOC ManagerSIEM Tools- Splunk, Azure SentinelEDR- DefenderCandidate Preferred Location: Pune IndiaAbout Alif Cloud IT Consulting: Alif Cloud IT Consulting is a leading provider of Microsoft Services Globally, Working...

  • L3 SOC Analyst

    5 days ago


    Bangalore, India AlifCloud IT Consulting Pvt. Ltd. Full time

    Job Title: Security Operations Centre (SOC) Analyst - WFH Work type- Remote/Hybrid Job Type: Full-time Department: Information Security Reports To: SOC Manager SIEM Tools- Splunk, Azure Sentinel EDR- Defender Candidate Preferred Location: Pune India About Alif Cloud IT Consulting: Alif Cloud IT Consulting is a leading provider of Microsoft...

  • SOC Manager

    3 weeks ago


    bangalore, India NeST Digital Full time

    Job Description Job Location: Tokyo,Japan15 + years of experience.Requires N2 & above strong Japanese language skills. With N3 having good conversation skills can be consideredExperience with SIEM tools (e.g., Splunk, IBM QRadar, ArcSight,Splunk,Cyberreason), EDR solutions (e.g., CrowdStrike, Carbon Black), and other SOC technologies.Proficiency in log...

  • L3 SOC Analyst

    1 week ago


    bangalore, India AlifCloud IT Consulting Pvt. Ltd. Full time

    Job Title: Security Operations Centre (SOC) Analyst - WFHWork type- Remote/HybridJob Type: Full-timeDepartment: Information SecurityReports To: SOC ManagerSIEM Tools- Splunk, Azure SentinelEDR- DefenderCandidate Preferred Location: Pune IndiaAbout Alif Cloud IT Consulting: Alif Cloud IT Consulting is a leading provider of Microsoft Services Globally, Working...

  • L3 SOC Analyst

    6 days ago


    bangalore, India AlifCloud IT Consulting Pvt. Ltd. Full time

    Job Title: Security Operations Centre (SOC) Analyst - WFHWork type- Remote/HybridJob Type: Full-timeDepartment: Information SecurityReports To: SOC ManagerSIEM Tools- Splunk, Azure SentinelEDR- DefenderCandidate Preferred Location: Pune IndiaAbout Alif Cloud IT Consulting: Alif Cloud IT Consulting is a leading provider of Microsoft Services Globally, Working...


  • bangalore, India NeST Digital Full time

    Job Description Job Location: Tokyo,Japan - 15 + years of experience. - Requires N2 & above strong Japanese language skills. With N3 having good conversation skills can be considered - Experience with SIEM tools (e.g., Splunk, IBM QRadar, ArcSight,Splunk,Cyberreason), EDR solutions (e.g., CrowdStrike, Carbon Black), and other SOC technologies. -...


  • bangalore, India NeST Digital Full time

    Job DescriptionJob Location: Tokyo,Japan- 15 + years of experience.- Requires N2 & above strong Japanese language skills. With N3 having good conversation skills can be considered- Experience with SIEM tools (e.g., Splunk, IBM QRadar, ArcSight,Splunk,Cyberreason), EDR solutions (e.g., CrowdStrike, Carbon Black), and other SOC technologies.- Proficiency in...

Soc Analyst

2 months ago


Bangalore City, India Deloitte Full time
The role requires efficient incident response and digital forensics skills to minimise the impact of cyber risks. The individual will oversee Security monitoring, Security tools Operations, Security incidents, ensure incidents are managed effectively and reported to stakeholders. This role primarily consists of first responder activities and to conducting thorough response activities on behalf of a wide variety of clients across every sector.Candidate required to work in complex security environments and alongside SOC team to design, communicate and execute incident response, containment, and remediation plans. Support incident response team analysts and incident management teams. Analyse tools, processes, and procedures for responding to cyber intrusions and come up with new methods for detecting cyber adversaries.Demonstrates proven expertise and success in incident handling, triage of events, network analysis and threat detection, trend analysis. Should have the following skills:Skills & Experience:Deep understanding of computer intrusion activities, incident response techniques, tools, and proceduresKnowledge of Windows, Active Directory, DNS & Linux operating systems,Good Experience in SIEM monitoring (QRadar, Sentinel)Knowledge of SOAR technologies, working with playbooks (Cortex, Phantom, Demisto)Working experience and knowledge of ITSM tools for incident management.Must be action oriented and have a proactive approach to solving issues.Knowledge of security logs, log quality review.Knowledge on IT (Operating systems, networking, databases) and IT security knowledge (system and network security) including IT security tools.Good knowledge of office collaboration toolsRoles & Responsibilities:Detect, Analyze, Investigate, and report qualified security incidents to the Client as per the defined SLAProvide recommendations to the security incidents reported as per SLAInvestigates incidents using various security event sources (FW, IDS, PROXY, AD, EDR, DLP etc.).Investigations into non-standard incidents and execution of standard scenarios.Provide dashboard and data related to Incidents/Offenses for governance reports.Escalates to L3 if investigations uncover unusual or atypical situations.Monitoring unhealthy log source/data source and escalate to engineering team to fix them.Participate in incident response (IR) efforts;

detect, identify, respond, contain and remediate all information security incidents.Rapidly and accurately determine the source of a security incident and moving quickly to identify and apply containment, mitigation, and remediation steps.Contribute to the execution of Cyber Security operations, incident response, and investigations spanning across all functions of the Corporate Security organization.Track, monitor incident actions while applying intelligence, situational awareness to prioritise incident actions based on riskResponsible for Incident and Breach communications, assessments, and reports and customer facing, to include leadership and executive management for the purpose of enabling Senior Management to make decisions in a crisisDevelop and document processes to ensure consistent and scalable response operationsDeliver tabletop IR assessments and real-life IR simulations at a technical and executive level.Conduct in-depth root cause analysis on complex malware and user/system behaviour eventGather and analyse forensic evidence for cyber security incidents and investigations.Develop and document enhanced event analysis and incident response processes and proceduresExperience:Overall experience of at least 5+ years in SIEM monitoring and Cyber security Incident response and ManagementHands-on experience with security tools and devices, operating systems, and/or networking devices desired.Proven skills and experience in log analysis, incident investigationsExperience working across diverse teams to facilitate solutionsExperience working with Security practitionersWillingness to working 24/7 environment in rotating shifts.Ability to work in time-sensitive and stressful situations with ease and professionalism, possess an efficient and versatile communication styleEvidence handlingData acquisition (Disk, Memory, Mobile, Cloud, Enterprise Wide)Digital forensics (Windows, Mac OS, Linux/Unix)Thorough understanding of Cyber kill chain and MITRE ATT&CK framework.Experience with one or more of SIEM tools such as QRadar, Sentinel, etc... is requiredExperience on EDR tools for Incident response and threat hunting (Crowdstrike, MS Defender, Sentinel One)Strong knowledge and experience with commonly used forensic toolsets, including EnCase, FTK.Experience reviewing raw logs and performing advanced data correlation and analysis (i.E., firewall, network flow, IPS, endpoint protection, web application, host OS, database, AAA, etc…)Experience of network & host-based forensic analysis and techniquesExperience of malware analysis and understanding attack techniques.Industry certifications such as along with experience will be a bonus. Experience in lieu of certification will be taken into consideration