Current jobs related to Soc Analyst - Gurgaon, Haryana - Mynd
-
SOC Analyst
7 days ago
Gurgaon, Haryana, India Xiarch Bharat Full time ₹ 2,50,000 - ₹ 7,50,000 per yearSOC Analyst – L1 (Monitoring & Triage)Job Purpose:The L1 SOC Analyst provides the first line of defense by monitoring alerts, performing initial triage (systematic evaluation, prioritization, and response to security alerts.) and escalating incidents as per SOPs and SLAs.Key Responsibilities:• Monitor SIEM, SOAR, EDR, and security dashboards 24x7.•...
-
Senior SOC Analyst Level 3
1 week ago
Gurgaon, Haryana, India Axa XL Full timeJob DescriptionWhat will your essential responsibilities include- Take full ownership of incidents escalated by Level 2 analysts.- Conduct complex investigations and provide advice to L2 SOC analysts.- Develop customized scripts and procedures to automate repetitive tasks and improve the efficiency of incident response activities.- Provide expert advice on...
-
SOC Analyst L3
2 weeks ago
Gurgaon, Haryana, India Rackspace Technology Full time ₹ 15,00,000 - ₹ 25,00,000 per yearSOC Analyst L3 (Sentinel is must)Our purpose is to enable our customers to defend against the evolving threat landscape across on-premises, private cloud, public cloud and multi-cloud workloads.Our goal is to go beyond traditional security controls to deliver cloud-native, DevOps-centric and fully integrated 24x7x365 cyber defence capabilities that deliver a...
-
SOC Analyst Level 2
2 weeks ago
Gurgaon, Haryana, India Axa XL Full timeJob DescriptionWhat will youressential responsibilities include- Act as an escalation point for Level 1 analysts and contribute to the Level 1 capability.- Deep dive analysis of escalated alerts to understand impact and prioritize tickets.- Provide additional context on the threats.- Forensics Investigations.- Monitor and support Incident remediation.- Root...
-
SOC Analyst L2
5 days ago
Gurgaon, Haryana, India Rackspace Technology Full time ₹ 9,00,000 - ₹ 12,00,000 per yearWhat were looking forTo support our continued success and deliver a Fanatical Experience to our customers, Rackspace Cyber Defence is looking for an Indian based Security Operations Analyst(L2) to support Rackspaces strategic customers.This role is particularly well-suited to a self-starting, experienced and motivated Sec Ops Analyst, who has a proven record...
-
Senior Security Analyst
1 week ago
Gurgaon, Haryana, India beBeeSecurity Full time US$ 90,000 - US$ 1,20,000The Role:Leads security investigations triggered by alerts from SIEM tools, tickets, and other incident sources.Develops, fine-tunes, and maintains correlation rules, parsers, and log source integrations in tools like QRadar.Serves as an escalation point for L1 analysts, guiding resolution of incidents and containment strategies.Prepares executive summary...
-
Security Analyst
2 weeks ago
Gurgaon, Haryana, India Advatix Full timeWe are seeking a highly experienced SOC L3 Analyst to strengthen our Security Operations Center. The ideal candidate will have advanced expertise in monitoring, analyzing, and mitigating cybersecurity threats, as well as managing security tools and mentoring junior analysts. This role involves proactive threat hunting, incident response, and collaboration...
-
GRC Analyst
3 weeks ago
Gurgaon, Haryana, India ThrivePass Full timeJob Description: GRC AnalystLocation: New Delhi, IndiaCompany: ThrivePassAbout ThrivePass:At ThrivePass, we empower organizations to offer benefits that truly matter. Our platform supports employee wellbeing, compliance, and growth through innovative technology, data-driven insights, and exceptional user experiences. Our culture is rooted in our CARE...
-
Cybersecurity Leadership Position
2 weeks ago
Gurgaon, Haryana, India beBeeSecurity Full time ₹ 1,50,000 - ₹ 28,00,000SOC Manager Job OverviewThe SOC Manager will oversee the Security Operations Center team, ensuring effective monitoring and response to security incidents. This role requires a strategic leader who can enhance the organization's security posture and mentor junior analysts.
-
01/09/2025) Security Analyst
3 weeks ago
Gurgaon, Haryana, India CIEL HR Full timeHiGreetings of the Day We have a critical opening with our client for Security Analyst role for Gurgaon location Experience 5 to 7 yrsLocation GurgaonPayroll Company Name CIEL HR ServicesMode of Employment ContractThe primary function of Security Analyst is to analyse any incidents escalated by various security tools and services and undertake the...

Soc Analyst
2 weeks ago
We are looking for the candidates from Delhi/NCR for the position of IT Security Engineer for US client in Gurgaon location
Candidates from West and South location need not to apply
Job description
Job Title: SOC Analyst Tier 2
Looking for Immediate Joiners or who can Join within 15-20 Days.
Location: Gurgaon
Shift: Rotational Shift / US Shift
Budget: As per market standards + Shift Allowances
Contract Tenure: 2 years contract on the payroll of Mynd solution.
Share your CV at "" Please share your CV With the Subject line as SOC Analyst
Work Experience
2 to 5 years of experience in Security Operations, SOC or Cybersecurity and Graduate in IT/CS from recognized University
Key Skills
- Candidate should be ready for rotational shift
-.Candidate must have Excellent communication Skill
Candidate must have the knowledge of penetration testing, Knowledge of TCP/IP protocols, network applications. Good knowledge of security tools and monitoring devices
CCNA would be preferred
Equivalent Certifications (Network+, Security+, CySA+, GSEC, GMON)
Job Requirement
Keysight is looking for a Cybersecurity Analyst to join its growing organization and be part of its in-house Security Operations Centre (SOC). This is a position requiring a good technical background in Information Security practice, good knowledge of IT Security threats and solid communication and organizational skills. The successful candidate is very motivated and willing to take on challenges, able to multi-task to succeed and has the ability work with the team to tackle incoming alerts. The Information Risk & Security team sets strategic direction for security within the organization and aligns with stakeholders throughout the company.
JOB DESCRIPTION
- Handling, and escalation of, alerts which require technical triage and analysis. This may include web attacks, malware infections, and phishing campaigns, which have been identified by the Information Risk & Security teams technology stack. Functional Responsibilities
- Experience Monitoring SIEM solutions and a variety of other security devices found in a SOC environment (e.g. Behavioral Analytics tools, IDS/IPS, log management tools, and security analytics platforms.
- Creating and maintaining documentation for security event processing.
- Acknowledge and handle the incoming security alerts.
- Use the internal ticketing system and dashboards to update the tickets/alerts accordingly and escalating them to the appropriate teams if necessary.
- Assist the Incident Response team on alerts escalated to them by the SOC team.
- Develop/Update and follow Standard Operating Procedures (SOPs) and Playbooks to handle standard and out-of-band alerts.
- Report to the Incident Response Team quickly and efficiently regarding urgent matters. Ensure ticket queues are always within satisfactory limits and all tickets are updated. Provide On-Call Support for emergency or high severity issues.
- Liaise with partner teams and end-users for security related tickets and activities.
- Excellent analytical and problem-solving skills required.
- Experience working with SIEMs and evaluating SIEM alerts.
- Experience leveraging core security and infrastructure technologies during investigations (e.g. firewall logs, network security tools, malware detonation devices, proxies, IPS/IDS) Key Competencies
- Ability to think with a security mindset. The successful candidate has a good IT background with good level knowledge of multiple relevant security practice areas (anti-malware solutions, patch and vulnerability management, network security; monitoring; endpoint, etc.)
• Knowledge of TCP/IP Protocols, network analysis, and network/security applications.
• Good knowledge of various security tools and monitoring devices; e.g. able to read and understand IDS/IPS/Firewall/Proxy logs and determine the current state of play. - Experience in correlating malware infections with attack vectors to determine the extent of security and data compromise.
- Ability to work in a time-sensitive environment; must be detail oriented and able to multitask to meet deadlines and company objectives.
- Experience in large, geographically diverse enterprise networks.
- Ability to build lasting relationships with partner teams and stakeholders.
- Documentation; experience in writing reports and documenting tickets efficiently and accurately.
Visit :
Feel free to reach me for any clarifications