Soc Analyst
2 weeks ago
The L1, L2 SOC Analyst leads advanced investigations, coordinates major incident responses and performs threat hunting, detection engineering and forensics. This role is also responsible for mentoring junior analysts, refining SOC processes and ensuring continuous improvement of detection and response capabilities.
KRAs
Critical Incident Leadership
Lead full lifecycle of P1/P2 incidents across customer environments.
- Act as Incident Commander coordinating SOC, client, legal and business units.
- Guide containment, eradication and recovery efforts.
Own timeline, documentation and RCA for major breaches.
Advanced Threat Detection & Adversary Emulation
Develop complex detection logic/use cases for evolving threats (APT, ransomware, 0-days).
- Perform detection gap analysis using MITRE ATT&CK.
Work with Red Team to simulate adversarial behaviour and tune detections accordingly.
Proactive Threat Hunting & Hypothesis Testing
Plan and execute strategic, hypothesis driven threat hunts.
- Build detection artifacts from telemetry (Windows logs, DNS, Proxy, EDR, cloud, etc.).
- Document hunt assumptions, queries, outcomes and recommendations.
Automate repeated hunts using scripting or SOAR.
Digital Forensics (Intermediate to Advanced)
Extract and analyse endpoint/memory/disk/network artifacts.
- Perform timeline analysis, file carving, binary inspection and log correlation.
- Support or lead forensic investigations in collaboration with DFIR teams.
Preserve evidence per legal and chain of custody standards.
SIEM & EDR Content Engineering
Author and optimize correlation rules across
multiple SIEMs (Splunk, QRadar, Sentinel, etc.).
- Write and maintain threat detection rules (KQL, SPL, Sigma, AQL, etc.).
- Develop parsers, normalization logic, dashboards and data models.
Tune rules to reduce false positives while maintaining efficacy.
SOAR & Automation Development
Architect advanced SOAR playbooks for IR, enrichment and notification.
- Write custom integrations using APIs or scripts (Python, PowerShell).
- Work with DevSecOps teams to expand automation coverage.
Validate automated actions comply with customer SOPs and SLAs.
Threat Intelligence Fusion
Ingest and operationalize IOC, TTP and threat actor data from TI feeds (commercial + OSINT).
- Create enriched detection content using threat intel.
- Profile threat actors impacting customers and track campaigns.
Recommend strategic threat mitigations based on actor behaviours.
Detection & Visibility Gap Management
Maintain matrix of covered vs uncovered attack techniques.
- Recommend log source onboarding for visibility improvement.
- Track telemetry coverage per customer and per data source.
- Maintain detection backlog based on threat landscape.
Security Architecture
Support
- Guide customers on optimal log source
configurations.
- Provide detection engineering input during
SIEM, EDR, cloud security deployments.
- Review and advise on network and endpoint
visibility architecture.
- Recommend sensor placement, retention,
parsing strategies.
Customer Facing Technical Leadership
Participate in high profile incident calls with customer security teams and executives.
- Present RCA findings, containment status and future recommendations.
- Customize threat detection based on customer assets, regulatory needs and threat models.
Attend monthly or quarterly review meetings as SME.
Policy, Compliance & Governance Support
Map detections to compliance needs (e.g., ISO 27001, PCI DSS, NIST
- Create incident documentation suitable for audits.
- Guide clients on SOC2 readiness, log retention, SIEM evidence practices.
Support regulator mandated reporting and breach notifications.
Tool Evaluation, Customization & Integration
Evaluate new tools: EDR, NDR, SOAR, UEBA, sandbox, threat intel.
- Recommend based on detection maturity and integration capability.
- Develop custom scripts, queries or API integrations.
Participate in POC testing and ROI analysis.
Shift Oversight & L2/L1 Mentorship
Act as escalation lead for complex investigations.
- Review L2 work for quality, completeness and accuracy.
- Mentor junior analysts, deliver training and coaching.
- Approve playbooks, rule updates and escalation paths.
Maintain escalation documentation and shift SOPs.
Metrics, Reporting & RCA Documentation
.Generate detection performance metrics (MTTD, MTTR, FP rate, missed attack rate).
- Document full RCAs, timelines, attack chains and remediation plans.
- Develop and refine metrics dashboards for SOC leadership and customers.
- Participate in regular performance and maturity reviews.
15 Scripting & DevSecOps Automation
- Write scripts and tools to aid triage, data enrichment and detection tuning.
- Use Python, Bash, PowerShell for custom tooling.
- Integrate SOAR/SIEM with APIs, DBs, threat intel and asset systems.
16 Cloud Security Monitoring
- Analyse cloud native logs (AWS CloudTrail, Azure Activity, GCP logs).
- Implement and monitor cloud specific detections and misconfiguration alerts.
- Recommend CSPM configuration and visibility improvements.
Map cloud events to MITRE ATT&CK (cloud tactics).
MITRE ATT&CK & Threat Modeling
Maintain and evolve ATT&CK Navigator heatmaps for customers.
- Use ATT&CK to map detection rules and hunting priorities.
Track adversary behaviours to improve detection maturity.
Ransomware & APT Readiness
Develop response guides and detections for
ransomware families (example- Ryuk, Lockbit, etc.).
- Track APT actor campaigns and IOC sets.
Lead tabletop exercises for ransomware/Apt preparedness.
Threat Landscape Intelligence & Briefings
Provide monthly/quarterly customer specific threat briefings.
- Summarize threat trends and emerging attacker TTPs.
Recommend defences aligned with risk profile and industry.
Knowledge Management & Documentation
Contribute to internal runbooks, SOPs, playbooks and threat reports.
- Maintain shared knowledge base for advanced attacks.
- Update IR templates, hunt notebooks and detection libraries.
Category Skills / Tools
SIEM Platforms: Splunk, Microsoft Sentinel, QRadar, Elastic SIEM
Endpoint Detection & Response (EDR) CrowdStrike, Defender, SentinelOne, Carbon Black
SOAR & Automation: Cortex XSOAR, Splunk SOAR, Swimlane, ServiceNow
Threat Intelligence Platforms: (TIPs) MISP, Recorded Future, ThreatConnect, Anomali
Forensics & Analysis: Velociraptor, Autopsy, FTK Imager, Wireshark
Network Detection & Monitoring (NDR): Zeek, Suricata, Darktrace, Vectra, Corelight
Cloud Security Monitoring: AWS GuardDuty, Azure Defender, GCP SCC, Wiz
MITRE ATT&CK & Threat Modelling: ATT&CK Navigator, Atomic Red Team, CALDERA
Ticketing / Workflow Systems: ServiceNow, Jira, RTIR, Remedy
Reporting & Dashboarding: Kibana, Power BI, Grafana, Tableau
Scripting & Automation: Python, PowerShell, Bash, APIs, Regex
Data Formats & Parsing: JSON, XML, Syslog, CEF, LEEF
Security Framework Knowledge: MITRE ATT&CK, NIST CSF, ISO 27001, CIS
Soft Skills & Leadership Technical writing, RCA presentation, mentoring
Threat Hunting: Query building, behavioural analytics
Adversary Simulation / Purple Team: Atomic Red Team, Caldera, SCYTHE
-
SOC Analyst
5 days ago
Noida, Uttar Pradesh, India Aguna Solutions Full timeJob Description:We are seeking an experienced and skilledSOC Analyst – Level 1to manage Security Operations Centre. As a SOC Analyst, you will play a pivotal role in managing end-to-end life cycle of managed SOC. Your expertise will drive efficiency, enhance productivity, and transform processes across our organization.As a SOC Analyst L1, you will be the...
-
SOC Analyst
5 days ago
Noida, Uttar Pradesh, India Aguna Solutions Full timeJob Description:We are seeking an experienced and skilledSOC Analyst – Level 2to manage Security Operations Centre. As a SOC Analyst, you will play a pivotal role in managing end-to-end life cycle of managed SOC. Your expertise will drive efficiency, enhance productivity, and transform processes across our organization.As a SOC Analyst Level 2, you will be...
-
SOC Analyst
5 days ago
Noida, Uttar Pradesh, India Paytm Payments Bank Full timeRole- SOC AnalystEducation- Any Bachelor's DegreeExperience- 1-3 years in Cybersecurity operations (SOC) preferably in financial service industry.Basic Knowledge• Networking protocols. • Malware, phishing, firewalls, etc • Windows & Linux OS • MITRE ATT&CK framework • Cyber attacksTools • Worked on any security Monitoring tools e.g., (DNIF,...
-
SOC Analyst
3 days ago
Noida, Uttar Pradesh, India Paytm Payments Bank Full timeRole-SOC AnalystEducation-Any Bachelor's DegreeExperience-1-3 years in Cybersecurity operations (SOC) preferably in financial service industry.Basic KnowledgeNetworking protocolsMalware, phishing, firewalls, etcWindows & Linux OSMITRE ATT&CK frameworkCyber attacksToolsWorked on any security Monitoring tools e.g., (DNIF, Splunk, Qradar)Ticketing tools (JIRA,...
-
SOC Analyst L2
5 days ago
Noida, Uttar Pradesh, India Aguna Solutions Pvt. Ltd. Full timeJob Description:We are seeking an experienced and skilled SOC Analyst – Level 2 to manage the Security Operations Centre. As a SOC Analyst, you will play a pivotal role in managing the end-to-end life cycle of managed SOC. Your expertise will drive efficiency, enhance productivity, and transform processes across our organization.As a SOC Analyst Level 2,...
-
SOC Manager
2 weeks ago
Greater Noida, Uttar Pradesh, India Callisto Search Full time ₹ 12,00,000 - ₹ 36,00,000 per yearSOC Strategy & LeadershipDefine and drive SOC strategy aligned with company vision and client needsOwn the multi-year SOC maturity roadmap (NIST, MITRE ATT&CK, etc.)Lead transformation initiatives (SOAR, UEBA, automation)Service DeliveryManagementEnsure consistent, high-quality 24x7 service delivery across all clientsOwn delivery SLAs (alert triage, IR, RCA,...
-
SOC Analyst L3
2 weeks ago
Noida, Uttar Pradesh, India Sanganan IT Solutions Pvt Ltd. Full time ₹ 12,00,000 - ₹ 36,00,000 per yearJob Title:Level 3 Security Operations Center (SOC) AnalystJob Type: Full TimeJob Location:WORK FROM NOIDA OFFICE, PLEASE DON'T APPLY IF YOU ARE LOOKING FOR HYBRID OR WORK FROM HOMEShort notice period or immediate joiners are preferred.SOC Analyst L3Job Title:Level 3 Security Operations Center (SOC) AnalystJob Type:Full-Time / ContractJob Overview:As a Level...
-
soc analyst
2 weeks ago
Noida, Uttar Pradesh, India Ontinue Full time ₹ 12,00,000 - ₹ 24,00,000 per yearAs a leading provider of AI-powered extended managed detection and response (MXDR) services, Ontinue is on a mission to be the most trusted, 24/7, always-on security partner that empowers customers to embrace the future by using AI to operate more strategically, at scale, and with less risk. We believe that the combination of AI and human expertise is...
-
SOC (Cyber Security) - L2
3 days ago
Noida, Uttar Pradesh, India Sanganan IT Solutions Pvt Ltd. Full timeSOC Analyst L2Job Title:Level 2 Senior Security Operations Center (SOC) AnalystJob Location:WORK FROM NOIDA OFFICE, PLEASE DON'T APPLY IF YOU ARE LOOKING FOR HYBRID OR WORK FROM HOMEShort notice period or immediate joiners are preferred.Job Overview:As a Senior SOC Engineer, you will play a pivotal role in enhancing the organization's cybersecurity...
-
Senior Cybersecurity SOC Analyst
3 days ago
Noida, Uttar Pradesh, India IDEMIA Full timeSince our founding, IDEMIA has been on a mission to unlock the world and make it safer through our cutting-edge identity technologies. Our technology leadership makes us the partner of choice for hundreds of governments and thousands of enterprises in over 180 countries, including some of the biggest and most influential brands in the world. In applying our...