Current jobs related to SOC Analyst - Remote India - Turing
-
SOC Analyst – Detection
3 weeks ago
India AiiR Response Full timeCompany Description AiiR Response Inc. is the first AI-driven breach response and extortion management platform, designed to automate negotiations, investigations, and recovery. Our platform, powered by our virtual analyst CEIRA, streamlines ransom negotiations, tracks cryptocurrency payments, conducts forensic investigations, and automates breach...
-
Freelance SOC Analyst
3 weeks ago
India ThreatXIntel Full timeCompany DescriptionThreatXIntel is a startup cyber security company dedicated to delivering customized, affordable solutions to protect businesses and organizations from cyber threats. With services including cloud security, web and mobile security testing, and DevSecOps, we ensure our clients have access to high-quality cyber security services regardless of...
-
Freelance Soc Analyst
3 weeks ago
India ThreatXIntel Full timeCompany Description Threat XIntel is a startup cyber security company dedicated to delivering customized, affordable solutions to protect businesses and organizations from cyber threats.With services including cloud security, web and mobile security testing, and Dev Sec Ops, we ensure our clients have access to high-quality cyber security services regardless...
-
Freelance SOC Analyst
3 weeks ago
India ThreatXIntel Full timeCompany Description ThreatXIntel is a startup cyber security company dedicated to delivering customized, affordable solutions to protect businesses and organizations from cyber threats. With services including cloud security, web and mobile security testing, and DevSecOps, we ensure our clients have access to high-quality cyber security services regardless...
-
SOC Analyst
1 week ago
Remote, India Sun King Full time ₹ 2,00,000 - ₹ 12,00,000 per yearDescriptionJob location: Remote in IndiaJob type: 6 months full time internshipAbout the role:We are looking for a SOC Analyst Intern to join our Cybersecurity team. In this role, you will provide Level 1 support by monitoring security alerts, investigating potential threats, managing cases and assisting in incident reporting and forensics. The role may...
-
Senior Analyst, SOC
7 days ago
Bengaluru, India News Corp Full timeJob Description Equal Opportunity Employer All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, protected veteran status, or disability status. EEO/AA/M/F/Disabled/Vets Job Description : About News Corp News Corp is a global diversified media and information services company...
-
SOC Analyst
1 day ago
Bengaluru, India AlifCloud IT Consulting Pvt. Ltd. Full timeJob Description Job Title: SOC Analyst L1/L2 (Remote) Location: NIBM Pune, India Job Type: Full-time Opportunity Experience: 3+ Years Shift: 5 days/ Week Rotational (24x07) Worksite: Remote but Onsite Preferred Application Deadline: 05 October 2025 NOTE - Early joiners would be prioritized in the interview process. Desired Skills and...
-
SOC Analyst
1 week ago
India AiiR Response Full timeCompany Description AiiR Response Inc. is the first AI-driven breach response and extortion management platform, designed to automate negotiations, investigations, and recovery. Our platform, powered by our virtual analyst CEIRA, streamlines ransom negotiations, tracks cryptocurrency payments, conducts forensic investigations, and automates breach...
-
SOC Analyst – Detection
1 week ago
India AiiR Response Full timeCompany DescriptionAiiR Response Inc. is the first AI-driven breach response and extortion management platform, designed to automate negotiations, investigations, and recovery. Our platform, powered by our virtual analyst CEIRA, streamlines ransom negotiations, tracks cryptocurrency payments, conducts forensic investigations, and automates breach...
-
L1 Security Analyst
2 weeks ago
India, Remote (Remote) Kobalt Security Inc. Full time ₹ 9,00,000 - ₹ 12,00,000 per yearAbout Us: At , our mission is to solve cybersecurity for SMBs at scale. We believe small businesses are the engine behind innovation and growth. Understanding the challenges that our customers have enables us to design and refine scalable cybersecurity services that support a secure path to growth. This is reflected in everything we do from the programs we...
SOC Analyst
2 weeks ago
Turing provides a platform that connects talents with our enterprise customers in a global marketplace. Our security engineers work on a broad set of efforts focusing on scaling and automating security infrastructure and processes. Our security engineers work on building the industry standard and implementing the best security practices in our platforms that connect enterprise environments. Our security engineers define and enforce the security protocols to operate services in a protected environment. Our security engineers also build and manage the framework for data access both internally and externally.
At Turing, we are continuously addressing the complex challenges of scaling our systems in a safe and secure manner. We are looking for passionate security engineers and leaders who are excited to solve intricate security problems in dynamic enterprise environments
OverviewWe are seeking a proactive and detail-oriented Security Operation Center Analyst to join our global security operations team. Split between India and Brazil, this role is critical to strengthening our frontline cyber defense capabilities. You will be responsible for triaging alerts, conducting initial investigations, handling low-complexity incidents, and escalating critical threats. The ideal candidate thrives in a fast-paced SOC environment, has a passion for cybersecurity, and is eager to grow in incident response, threat detection, and operational support.
Responsibilities:- Review and analyze alerts escalated by the MDR team via Google Chronicle.
- Perform deep-dive investigations into suspicious activity across identity, SaaS, endpoint, and cloud logs.
- Incident response activities for medium-to-high severity incidents, including containment, eradication, and recovery (e.g., disabling user accounts, blocking malicious IPs).
- Escalate complex or high-impact incidents to Senior Analysts / Incident Response Engineer or relevant stakeholders for further investigation.
- Periodically audit alert rules, integrations, and logging health.
- Coordinate with DevOps and application teams to triage vulnerability findings from Rapid7 platforms (InsightVM, CloudSec, AppSec), communicate remediation needs, and track resolution progress.
- Own the triage and response process for security alerts from MDR, EDR, and cloud platforms, ensuring actions are taken within defined service level agreements (SLAs). Escalate potential breaches or blockers to maintain response effectiveness.
- Suggest automation opportunities for enrichment, containment, or playbook actions.
- Monitor the performance and availability of security tools (e.g., Google SecOps, Rapid7, EDR platforms).
- Triage and investigate endpoint detection and response (EDR) alerts from CrowdStrike or similar tools.
- Conduct regular threat hunting to proactively identify potential compromises.
- Identify threat actor tactics, techniques, and procedures (TTPs) and map to MITRE ATT&CK when relevant.
- Work closely with internal stakeholders and MDR partners to iterate on SOAR automation, ensuring playbooks align with Turing's detection use cases and operational goals.
- Maintain detailed documentation for each incident using approved tooling (e.g., Jira, Google Docs).
- Provide feedback on SOAR actions and Chronicle detection rules based on observed MITRE ATT&CK patterns, and suggest tuning or coverage improvements.
- Required Skills:
- 3 - 5 years of hands-on experience in a Security Operations Centre (SOC) or similar cybersecurity role, ideally in a cloud-native or SaaS environment.
- Strong grasp of alert triage, incident detection, and containment fundamentals, including how to assess severity and escalate appropriately.
- Familiarity with SIEM, EDR, and vulnerability management platforms, with an ability to investigate and correlate findings across these tools.
- Working knowledge of network protocols, log types, and attacker TTPs, especially across cloud and SaaS environments.
- Ability to follow incident response playbooks and SOPs with precision.
- Proficiency in managing security tickets and documenting investigative steps clearly.
- Excellent analytical skills with a high attention to detail and a sense of urgency.
- Good written and verbal communication skills, especially for documenting incidents and collaborating with peers across time zones.
- Excellent communication skills, both written and verbal.
- Good To Have:
- Experience working in a co-managed SOC or MDR-supported environment.
- Strong understanding of alert triage, incident detection, and basic containment procedures.
- Exposure to cloud and SaaS platform logs (e.g., Google Workspace, Okta, GitHub).
- Familiarity with the MITRE ATT&CK framework for mapping attacker techniques.
- Basic familiarity with scripting or automation tooling, including formats like YAML, Python, Bash, Sigma, or UDM.
- Excellent analytical skills with a high attention to detail and a sense of urgency.
- Good written and verbal communication skills, especially for documenting incidents and collaborating with peers across time zones.
- One or more relevant certifications (CEF Certified Ethical Hacker (CEF-CEH), CompTIA Security , etc.).