Soc Analyst

1 week ago


Bengaluru Hyderabad Pune, India Flexability Hr Solutions Full time US$ 90,000 - US$ 1,20,000 per year

Role & responsibilities

The primary role of a Security Analyst (L2) is the detailed and repeatable execution of all operational tasks as documented in processes and subordinate procedures. Specifically, these analysts will be responsible for monitoring the SIEM tools for security events and closing or escalating those events as necessary. Security Analysts maintain the group email address and distribution lists, answer the main phone lines, and update all relevant documentation such as shift logs and tickets. Additionally, assist the MDR Analyst in an incident workflow and assist the MDR team in incident detection, remediation and communicate with external teams in proper incident resolution. We are currently seeking a Senior Security Associate for our KPMG Managed Services (Spectrum) practice to join us in our Bangalore office.

Note : Candidate must be willing to Work from Office only (Bangalore Location) & willing to do 24x7 rotational shift (Mandatory requirement for this role)

Specifically, Security Analysts (L2) will:

  1. Rapidly identify, categorize, prioritize and investigate events as the initial cyber event detection group for the enterprise using all available security logs and intelligence sources to include but not limited to:

a. Firewalls (Zscalar, Cisco ASA & Palo Alto etc.,)

b. Systems and Network Devices

c. Web Proxies (Zscalar)

d. Intrusion Detection/Prevention Systems (Zscalar, Cisco ASA & Palo Alto etc.,)

e. Data Loss Prevention (Zscalar)

f. EDR / Antivirus Systems (Crowd Strike, MDE etc.,)

g. Knowledgebase Framework (Confluence)

  1. Continuously monitor SIEM and logging environments for security events and alerts to threats, intrusions, and/or compromises, including:

  2. SIEM tools like Splunk & Microsoft Sentine queue management from different data sources Network/EndPoint/Firewall etc., (Splunk & Microsoft Sentinel etc.,)

  3. Security email inbox (ProofPoint, Rapid7, Area1 etc.,)
  4. Intel feeds via email and other sources (e.g. NH-ISAC)
  5. Incident Ticketing queue (ServiceNow)

  6. Validate alerts as they come in to eliminate false positives and use other internal and external data sources to enrich alerts with additional context

  7. Perform triage of service requests from customers and internal teams

  8. Use playbook procedures to carry out standard plays for routine event types and escalate alerts to Level 2 Analysts for further triage and remediation

  9. Assist with containment of threats and remediation of environment during or after an incident

  10. Act as a participant during Threat Hunting activities at the direction of one or more Incident Response Handlers

  11. Document event analysis and write comprehensive reports of incident investigations

  12. Proactively improve security-related operational processes and procedures

  13. Use available security tools for historical analysis purposes as necessary for detected events; for example, historical searches using SIEM tools (Splunk & Microsoft Sentinel)

  14. Maintain operational shift logs with relevant activity from the Analysts shift. Document investigation results, ensuring relevant details are passed to Level 2 or MDR Analysts for final event analysis

  15. Update/reference knowledgebase tool (e.g. Confluence) as necessary for changes to processes and procedures, and ingest of daily intelligence reports and previous shift logs

  16. Conduct research and document events of interest within the scope of IT Security

  17. Alternatively, consulting, or advisory experience in Security Operations

  18. Monitor and analyse Intrusion Detection Systems (IDS), Anomaly Detection Systems (ADS), Firewall event logs, Security Incident and Event Management (SIEM) toolset and other event logs to identify security attacks and threats for remediation/suppression.

  19. Validate IOCs that triggered the original alert.

  20. Research additional internal and external data sources for additional enrichment of event information

  21. Determine when an event has reached the threshold of an incident and engage Incident Response Handler to declare an incident.

  22. Create filters, data monitors, dashboards, and reports within monitoring utilities.

  23. Troubleshoot security monitoring devices to improve event correlation and performance.

  24. Handle high and critical severity incidents as described in the operations playbook.

  25. Operational level experience in some of these domains (not all): security engineering, alert triaging, rule writing, incident response, DFIR, threat intelligence and management, vulnerability management, and security control testing

  26. In-depth knowledge of at least one SIEM platform or security data lake and related processes

  27. Knowledge of various security tools, their functions, and comparisons

  28. Knowledge of network and cloud security fundamentals

  29. Ability to explain complex technical concepts in business terms.

  30. Extensive experience in report writing and presentation.

  31. Strong, adaptable, and flexible work ethic

  32. Good time management skills

  33. Ability to work under pressure and prioritise activities

Qualifications

  • Bachelor's degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field
  • 5+ years of technical experience of prior MDR/SOC/Incident response experience
  • Demonstrated technical knowledge of current network security, network hardware, protocols, and standards required
  • Shall have demonstrated professional experience in incident detection and response, malware analysis, or cyber forensics
  • Act as a workstream participant to support tier-1, tier-2, or tier-3 SOC environments
  • Demonstrated strong oral and written communication and client facing skills
  • Demonstrated strong analytical and communications skills
  • Flexibility to adapt to different types of engagement, working hours, work environments, and locations
  • Proven ability to work creatively, analytically in a problem-solving environment
  • Ability to work nights, weekends, and/or holidays in the event of an incident response emergency
  • Be comfortable working against deadlines in a fast-paced environment
  • Identify issues, opportunities for improvement, and communicate them to an appropriate senior member
  • Demonstrated technical knowledge of current network security, network hardware, protocols, and standards required

Required skills:

  • 6+ years of technical experience in Information Security
  • Experience with SIEM tools (Qradar, Splunk, Logrhythm, Solarwinds, etc.)
  • Experience in Azure Sentinel
  • Familiarity with common IDS/IPS and Firewalls (Snort, Cisco, Fortigate, Sourcefire)
  • Familiarity with incident response process and activities
  • Familiarity with TCP/IP protocol, OSI Seven Layer Model
  • Knowledge of Windows, Unix-based systems, architectures, and network security devices
  • Intermediate level of knowledge of LAN and WAN technologies
  • Must have a solid understanding of information technology, information security domains
  • Knowledge of security best practices and concepts
  • Desired certifications: Security+, C|EH, Network+, Certified Information Systems Security Professional (CISSP), GIAC Certified Intrusion Analyst, GIAC Certified Incident Handler, or GIAC Reverse Engineering Malware
  • Familiarity with ticketing tool / ITSM tool
  • Personal drive, positive work ethic to deliver results within tight deadlines and in demanding situations

Preferred candidate profile


  • Soc Analyst

    3 days ago


    Bengaluru, Karnataka, India Diverse Lynx Full time

    Job Role SOC Analyst Job Location Bangalore

  • SOC Analyst

    1 week ago


    Pune, Maharashtra, India Connect2Talent Full time

    Job Title : SOC Analyst (Security Operations Center)Experience : 4-6 YearsJob Type : Full-timeLocation : Pune / BangaloreNotice Period : 15 DaysJob Description :We are seeking a highly skilled SOC Analyst to join our cybersecurity team. The ideal candidate will have hands-on experience in monitoring, detecting, investigating, and responding to security...


  • Pune, Maharashtra, India AiiR Response Full time

    Company DescriptionAiiR Response Inc. is the first AI-driven breach response and extortion management platform, designed to automate negotiations, investigations, and recovery. Our platform, powered by our virtual analyst CEIRA, streamlines ransom negotiations, tracks cryptocurrency payments, conducts forensic investigations, and automates breach...

  • SOC Analyst

    1 week ago


    Hyderabad, Telangana, India Evnek Full time ₹ 9,00,000 - ₹ 12,00,000 per year

    Job Title:SOC AnalystExperience Required:5+ YearsLocation:HyderabadShift:Rotational ShiftsNotice Period:Immediate Joiners OnlyCab Facility:AvailableJob SummaryWe are seeking a skilled and proactiveSOC Analyst tojoin our Security Operations Center in Hyderabad. The ideal candidate will be responsible for monitoring and responding to cybersecurity threats,...

  • SOC Analyst

    1 week ago


    Bengaluru, Karnataka, India NexionPro Full time ₹ 5,00,000 per year

    Job Title: SOC Analyst (Level 2/3)Experience: 2 to 5 YearsLocation: Bengaluru, IndiaWork Mode: 5 Days – Work from OfficeCompany: NexionProNotice Period: Immediate to 15 DaysAbout UsAt NexionPro, we're committed to building a safer digital future by delivering cutting-edge cybersecurity solutions. As part of our rapidly growing Security Operations Center...

  • SOC Analyst

    1 week ago


    Bengaluru, Karnataka, India Ethos Life Full time US$ 80,000 - US$ 1,20,000 per year

    About the Role We are seeking a motivated and detail-oriented SOC Analyst to join our Security Operations Center team. The SOC Analyst will be responsible for monitoring, detecting, analyzing, and responding to security incidents in a timely and effective manner. This role is critical to protecting our organization's information assets and ensuring the...

  • SOC Analyst

    1 week ago


    Bengaluru, Karnataka, India Kroll Inc. Full time US$ 90,000 - US$ 1,20,000 per year

    Job Title: SOC AnalystReports to: SOC Manager – Client ProgrammeEngagement Model: Client-dedicated, 16x7Role OverviewAs a SOC Analyst supporting one of our client engagements, you will be responsible for monitoring, analysing, and resolving security-related tickets as part of a dedicated 16x5 Security Operations Centre. This role is critical to ensuring...

  • SOC Analyst

    1 week ago


    Bengaluru, Karnataka, India NTT DATA Business Solutions Full time ₹ 9,00,000 - ₹ 12,00,000 per year

    Role & responsibilitiesJob Title: SOC Analyst Japanese Language (JLPT N4)Location: Bangalore (Hybrid Mode)Experience Required: 1.6 to 10 yearsWork Mode: HybridClient Location: BangaloreJob DescriptionWe are looking for a highly motivated SOC Analyst with Japanese language proficiency (JLPT N4) to join our clients Information Security team. The ideal...

  • SOC Analyst

    7 days ago


    Hyderabad, Telangana, India Opentext Full time ₹ 1,04,000 - ₹ 1,30,878 per year

    Your impact:Perform monitoring, identification, investigation, documentation, resolution and reporting of security alerts through prioritization of events based on risk/exposure.Analyze Endpoint Detection and Response (EDR), Network, Cloud and other traffic and log data for potential threats or vulnerabilities.Generating tickets and incident reports to...

  • Soc Analyst

    1 week ago


    Bengaluru, Chennai, Hyderabad, India Cloudxtreme Full time ₹ 9,00,000 - ₹ 12,00,000 per year

    Role & responsibilitiesCandidate should have experience in MS sentinel & MS Defender, SOC.Well-versed in Microsoft Security Products, including MS Defender for Endpoint, Cloud, Identity, AV, and MS Sentinel.Knowledge of Incident Response frameworks knowledge (NIST, MITRE ATT&CK, Cyber Kill Chain)C-SOC Level 2 Analysts are responsible for advanced incident...