SOC Analyst

2 days ago


Remote, India turing Full time ₹ 9,00,000 - ₹ 12,00,000 per year

Location: Remote - India

About Turing

Based in Palo Alto, California, Turing is one of the world's fastest-growing AI companies accelerating the advancement and deployment of powerful AI systems. Turing helps customers in two ways: working with the world's leading AI labs to advance frontier model capabilities in thinking, reasoning, coding, agentic behavior, multimodality, multilingualism, STEM and frontier knowledge; and leveraging that expertise to build real-world AI systems that solve mission-critical priorities for Fortune 500 companies and government institutions. Turing has received numerous awards, including Forbes's "One of America's Best Startup Employers," #1 on The Information's annual list of "Most Promising B2B Companies," and Fast Company's annual list of the "World's Most Innovative Companies." Turing's leadership team includes AI technologists from industry giants Meta, Google, Microsoft, Apple, Amazon, Twitter, McKinsey, Bain, Stanford, Caltech, and MIT. For more information on Turing, visit For information on upcoming Turing AGI Icons events, visit

Job Description

Turing provides a platform that connects talents with our enterprise customers in a global marketplace. Our security engineers work on a broad set of efforts focusing on scaling and automating security infrastructure and processes. Our security engineers work on building the industry standard and implementing the best security practices in our platforms that connect enterprise environments. Our security engineers define and enforce the security protocols to operate services in a protected environment. Our security engineers also build and manage the framework for data access both internally and externally.

At Turing, we are continuously addressing the complex challenges of scaling our systems in a safe and secure manner. We are looking for passionate security engineers and leaders who are excited to solve intricate security problems in dynamic enterprise environments

Overview

We are seeking a proactive and detail-oriented Security Operation Center Analyst to join our global security operations team. Split between India and Brazil, this role is critical to strengthening our frontline cyber defense capabilities. You will be responsible for triaging alerts, conducting initial investigations, handling low-complexity incidents, and escalating critical threats. The ideal candidate thrives in a fast-paced SOC environment, has a passion for cybersecurity, and is eager to grow in incident response, threat detection, and operational support.

Responsibilities:
  • Review and analyze alerts escalated by the MDR team via Google Chronicle.
  • Perform deep-dive investigations into suspicious activity across identity, SaaS, endpoint, and cloud logs.
  • Incident response activities for medium-to-high severity incidents, including containment, eradication, and recovery (e.g., disabling user accounts, blocking malicious IPs).
  • Escalate complex or high-impact incidents to Senior Analysts / Incident Response Engineer or relevant stakeholders for further investigation.
  • Periodically audit alert rules, integrations, and logging health.
  • Coordinate with DevOps and application teams to triage vulnerability findings from Rapid7 platforms (InsightVM, CloudSec, AppSec), communicate remediation needs, and track resolution progress.
  • Own the triage and response process for security alerts from MDR, EDR, and cloud platforms, ensuring actions are taken within defined service level agreements (SLAs). Escalate potential breaches or blockers to maintain response effectiveness.
  • Suggest automation opportunities for enrichment, containment, or playbook actions.
  • Monitor the performance and availability of security tools (e.g., Google SecOps, Rapid7, EDR platforms).
  • Triage and investigate endpoint detection and response (EDR) alerts from CrowdStrike or similar tools.
  • Conduct regular threat hunting to proactively identify potential compromises.
  • Identify threat actor tactics, techniques, and procedures (TTPs) and map to MITRE ATT&CK when relevant.
  • Work closely with internal stakeholders and MDR partners to iterate on SOAR automation, ensuring playbooks align with Turing's detection use cases and operational goals.
  • Maintain detailed documentation for each incident using approved tooling (e.g., Jira, Google Docs).
  • Provide feedback on SOAR actions and Chronicle detection rules based on observed MITRE ATT&CK patterns, and suggest tuning or coverage improvements.
Qualifications Needed:
  • Required Skills:

  • 3 - 5 years of hands-on experience in a Security Operations Centre (SOC) or similar cybersecurity role, ideally in a cloud-native or SaaS environment.

  • Strong grasp of alert triage, incident detection, and containment fundamentals, including how to assess severity and escalate appropriately.
  • Familiarity with SIEM, EDR, and vulnerability management platforms, with an ability to investigate and correlate findings across these tools.
  • Working knowledge of network protocols, log types, and attacker TTPs, especially across cloud and SaaS environments.
  • Ability to follow incident response playbooks and SOPs with precision.
  • Proficiency in managing security tickets and documenting investigative steps clearly.
  • Excellent analytical skills with a high attention to detail and a sense of urgency.
  • Good written and verbal communication skills, especially for documenting incidents and collaborating with peers across time zones.
    Excellent communication skills, both written and verbal.

  • Good To Have:

  • Experience working in a co-managed SOC or MDR-supported environment.

  • Strong understanding of alert triage, incident detection, and basic containment procedures.
  • Exposure to cloud and SaaS platform logs (e.g., Google Workspace, Okta, GitHub).
  • Familiarity with the MITRE ATT&CK framework for mapping attacker techniques.
  • Basic familiarity with scripting or automation tooling, including formats like YAML, Python, Bash, Sigma, or UDM.
  • Excellent analytical skills with a high attention to detail and a sense of urgency.
  • Good written and verbal communication skills, especially for documenting incidents and collaborating with peers across time zones.
  • One or more relevant certifications (CEF Certified Ethical Hacker (CEF-CEH), CompTIA Security+, etc.).
Advantages of joining Turing:
  • Amazing work culture (Super collaborative & supportive work environment; 5 days a week)
  • Awesome colleagues (Surround yourself with top talent from Meta, Google, LinkedIn etc. as well as people with deep startup experience)
  • Competitive compensation
  • Flexible working hours
  • Full-time remote opportunity

Don't meet every single requirement? Studies have shown that women and people of color are less likely to apply to jobs unless they meet every single qualification. Turing is proud to be an equal opportunity employer. We do not discriminate on the basis of race, religion, color, national origin, gender, gender identity, sexual orientation, age, marital status, disability, protected veteran status, or any other legally protected characteristics. At Turing we are dedicated to building a diverse, inclusive and authentic workplace and celebrate authenticity, so if you're excited about this role but your past experience doesn't align perfectly with every qualification in the job description, we encourage you to apply anyways. You may be just the right candidate for this or other roles.


  • SOC Analyst

    2 days ago


    Remote - India Turing Full time US$ 90,000 - US$ 1,20,000 per year

    Job Description Turing provides a platform that connects talents with our enterprise customers in a global marketplace. Our security engineers work on a broad set of efforts focusing on scaling and automating security infrastructure and processes. Our security engineers work on building the industry standard and implementing the best security practices in...

  • SOC L3

    5 days ago


    Remote, India Sennovate Full time

    **Role: SOC L3** **Location: Hybrid - (Coimbatore, Chennai and Bangalore)** **About Sennovate** **What We’re Looking For** Sennovate is looking for a self-motivated person in SOC Domain for the role of Technical Lead. This involves leading the SOC Team with more emphasis on RnD in Security domain. **Wait!!! Please review our culture below...

  • L1 Security Analyst

    2 days ago


    Remote, India Kobalt Security Inc. Full time ₹ 8,00,000 - ₹ 12,00,000 per year

    About Us: At , our mission is to solve cybersecurity for SMBs at scale. We believe small businesses are the engine behind innovation and growth. Understanding the challenges that our customers have enables us to design and refine scalable cybersecurity services that support a secure path to growth. This is reflected in everything we do from the programs we...


  • Remote, India BTG PR Full time ₹ 50,000 - ₹ 1,00,000 per year

    At BTG, we are a leading provider of managed cybersecurity and network operation services. Our Hybrid SNOC model (Security & Network Operations Center) integrates advanced threat detection, incident response, and continuous monitoring using cutting-edge technologies like Wazuh SIEM/XDR, WithSecure EDR/EPP, Microsoft 365 Security, and our proprietary...


  • Remote, India Certify Full time ₹ 1,04,000 - ₹ 1,30,878 per year

    About Certify:At CertifyOS, we're building the infrastructure that powers the next generation of provider data products, making healthcare more efficient, accessible, and innovative. Our platform is the ultimate source of truth for provider data, offering unparalleled ease and trust while making data easily accessible and actionable for the entire healthcare...


  • Remote, India ITDefined Full time ₹ 2,50,000 - ₹ 3,00,000 per year

    Key ResponsibilitiesServe as Cybersecurity Incident Coordinator & SOC Liaison, advancing incident management and assisting in remediation of security incidents.• Capture insights, conduct retrospectives, maintain metrics, and improve response processes.• Explain cybersecurity processes during audits and champion security awareness across teams and...


  • Remote, India beBeeCompliance Full time US$ 7,50,000 - US$ 10,00,000

    Security Assurance Analyst RoleAt the forefront of security and integrity, our operations prioritize safeguarding systems, data, and customer information against emerging threats. We seek a dedicated Security Assurance Analyst to lead compliance with industry standards and regulatory frameworks.Main ResponsibilitiesProvide expert guidance on PCI DSS, ISO...


  • Remote, India Unisys Full time

    **What success looks like in this role**: - Networking and Firewall Change Reviews: Collaborate with network teams to evaluate and approve firewall and network change requests, ensuring security compliance and optimal performance. - Policy and Procedure Enhancement: Develop, refine, and communicate infrastructure security policies and procedures to various...


  • Remote, India Scrut Automation Full time ₹ 9,00,000 - ₹ 12,00,000 per year

    Job Description: Customer Success Manager- US (Remote) Role Details Position: Customer Success Manager- US Location: Remote Shift timings : 7pm- 4am IST About SCRUT Automation Scrut Automation is an information security and compliance monitoring platform, aimed at helping small and medium cloud-native enterprises develop and maintain a robust...


  • Remote, India turing Full time US$ 1,00,000 - US$ 1,50,000 per year

    Location: Remote - IndiaAbout TuringBased in Palo Alto, California, Turing is one of the world's fastest-growing AI companies accelerating the advancement and deployment of powerful AI systems. Turing helps customers in two ways: working with the world's leading AI labs to advance frontier model capabilities in thinking, reasoning, coding, agentic behavior,...