SOC Analyst
3 weeks ago
Job Description Skills: SIEM, edr, Threat & Vulnerability Management, Log Analysis, Incident Management, Email Security, xdr, crowdstrike, JOB TITLE: L2 Security Operations Center (SOC) Analyst Job Purpose To act as a senior-level analyst in the 24x7 Security Operations Center (SOC), responsible for advanced security event triage, log analysis, threat investigation, and response coordination using modern security platforms such as SIEM, SOAR, EDR, and Threat Intelligence systems. The L2 SOC Engineer will also contribute to dashboard optimization, incident documentation, playbook updates, and assist in the administration of key tools such as Splunk and CrowdStrike. Qualification Graduation Certifications - CompTIA CySA+ / Security+ / CEH - Splunk Core Certified User / Power User - Microsoft AZ-500 / SC-200 - CrowdStrike Certified Falcon Responder (CFR) Any of the above. Location: Navi Mumbai Responsibilities (includes All Tasks) Security Monitoring & Incident Handling - Triage and investigate escalated alerts from SIEM, XDR (CrowdStrike), EDR, email, and network security tools. - Perform log correlation and in-depth investigations using Splunk/Elastic dashboards and queries. - Handle incidents across endpoints, cloud (Azure/OCI/GCP), email, DLP, and network layers. - Respond to phishing, malware, unauthorized access, and insider threat alerts. - Support forensic triage using EDR tools and sandbox results (e.g., Falcon Sandbox). SOC Engineering & SIEM Operations - Create, fine-tune, and optimize detection rules and dashboards in Splunk. - Maintain and troubleshoot Splunk forwarders, heavy forwarders, and dashboards under guidance. - Participate in log onboarding and validation for new sources (e.g., CSPM, EDR, DLP, Cloud tools). - Support automation workflows and enrichment via playbooks. Tool Proficiency & Admin Support - Hands-on knowledge of: - SIEM: Splunk, Elastic (optional) - EDR/XDR: CrowdStrike - Email Security: Mimecast - DLP: Forcepoint (Web/Email), Netskope (CASB/ZTNA) - Vulnerability Management: Nessus, Qualys - Threat Intel Tools: IOC lookups, sandboxing tools, OSINT Documentation & Compliance - Maintain updated incident records, timelines, and evidence in ITSM or ticketing platforms. - Contribute to SOP/Playbook updates, audit reports, and RCA documentation. - Participate in compliance checks for ISO 27001 and internal audits. Continuous Improvement - Suggest detection logic improvements based on new threats or recurring false positives. - Engage in purple teaming and threat hunting exercises as needed. Technical Skills /Competencies MANDATORY - 3-6 years of relevant experience in a SOC environment. - Strong hands-on knowledge of SIEM (Splunk) and EDR (CrowdStrike). - Experience in log analysis, threat detection, and incident handling. - Good understanding of TCP/IP, DNS, HTTP, VPN, authentication, cloud security basics. - Familiarity with ISO 27001, or NIST 800-61 IR process is a plus. - Certifications such as CompTIA CySA+, CEH, Splunk Core/User, or AZ-500 preferred. OPTIONAL Soft Skills MANDATORY - Bachelors degree in computer science, Information Technology, or related field. - At least 6 years of experience in support operations - Strong analytical mindset and attention to detail. - Ability to prioritize under pressure and respond within SLA timelines. - Proactive, accountable, and a team player. - Willingness to work in shifts (24x7 SOC coverage) if required.
-
SOC Analyst
1 week ago
Mumbai, Maharashtra, India MNR solutions pvt Full time ₹ 8,00,000 - ₹ 24,00,000 per yearSOC Analyst – L2Experience:- 4 to 8 YearsLocation: MumbaiWork Mode: Work from Office (5 Days WFO)Key ResponsibilitiesConfigure, maintain, and fine-tune the Splunk SIEM environment for optimized log management and event correlation.Develop and manage security rules, dashboards, and alerts to enhance detection and monitoring capabilities.Monitor and analyze...
-
Soc Analyst Manager
2 weeks ago
Mumbai, Maharashtra, India ERM Placement Services Full time ₹ 12,00,000 - ₹ 24,00,000 per yearThe SOC Analyst will be responsible for monitoring, analyzing, and responding to security incidents using Microsoft Sentinel and Microsoft Defender. The role requires a proactive approach to threat detection and mitigation, ensuring the protection of our network and data infrastructure.Key Responsibilities:Monitoring and Analysis:Continuously monitor...
-
SOC Analyst
7 days ago
Mumbai, India Tata Consultancy Services Full timeJob Description Greetings from Tata Consultancy Services!! We are hiring : SOC Analyst Experience : 2 to 8 years Location : Mumbai Required Technical Skill Set : SIEM, SOAR, Threat Intelligence, Malware Analysis, Reverse Engineering, Threat Hunting Must-Have 1. Proficiency in using SIEM tools (e.g., IBM QRadar, Splunk) for log analysis and incident detection...
-
L2 SOC Analyst
2 days ago
Bengaluru, India Virtusa Full timeJob Description Job Description - Support Security Operations Center (SOC) as a shift lead, performing threat based detailed investigations, recommending incident detection methodologies, and providing expert support to incident response and monitoring functions. - Be a technical and thought leader in driving KPI metrics, automation, analytics, and...
-
SOC Lead
4 days ago
Mumbai, Maharashtra, India Innova ESI Full timeRole : SOC LeadExp : 7 + Years.Location : Mumbai ( Vasai), WFOSkills : SOC Analyst, Good experience in SIEM, Qradar,Threat – Hunting.
-
OT SOC Analyst
4 weeks ago
Mumbai, India Antal International Network Full timeJob Description Job Description Mandate skill:- Nozomi/ claroty , Implementation Notice period : immediate We are seeking a highly skilled and experienced OT Security Operations Center (SOC) Analyst / Engineer with a strong background in Nozomi Networks and operational technology (OT) environments. The ideal candidate will have a minimum of 2 years of...
-
Senior SOC Analyst
3 weeks ago
India Protera Full timeJob Description Job Title: Senior SOC Analyst Shift Timing- Rotational Work mode- Remote, India Role Overview: Join a highly skilled and motivated team of Cyber Security Professionals tasked with protecting Protera Technologies and its customers. The Senior SOC Analyst role is focused on leading incident response efforts, threat hunting, digital forensics,...
-
Manager-SOC-Information Security
1 week ago
Mumbai, India Jinendra Infotech - India Full timeJob Description - The SOC L3 Manager is responsible for managing the Security Operations Center (SOC) at the highest level. This role involves overseeing daily operations, managing escalations, and ensuring timely detection, analysis, and response to cybersecurity incidents. The SOC L3 Manager will provide strategic direction, mentor SOC analysts, and...
-
Soc-l2
1 week ago
Mumbai, India Locuz Enterprise Solutions Full time**L2 SOC Job Description** - Act as a point of escalation for Level-1 SOC security analysts in support of information security investigations to provide guidance and oversight on incident resolution and containment techniques. - Should have experience in Developing new correlation rules & Parser writing - Experience in Log source integration - Act as the...
-
Soc-l3
1 week ago
Mumbai, India Locuz Enterprise Solutions Full timeAct as a point of escalation for Level-2 SOC security analysts in support of information security investigations to provide guidance and oversight on incident resolution and containment techniques. - Should have experience in Developing new correlation rules & Parser writing - Experience in Log source integration - Act as the lead coordinator to individual...