What Jobs are available for C Soc Analyst in India?

Showing 2662 C Soc Analyst jobs in India

SOC Analyst L2

New Delhi, Delhi NTT America, Inc.

Posted today

Job Viewed

Tap Again To Close

Job Description

**Make an impact with NTT DATA**
Join a company that is pushing the boundaries of what is possible. We are renowned for our technical excellence and leading innovations, and for making a difference to our clients and society. Our workplace embraces diversity and inclusion - it's a place where you can grow, belong and thrive.
**Your day at NTT DATA**
The Security Managed Services Engineer (L2) is a developing engineering role, responsible for providing a managed service to clients to ensure that their Security Infrastructures and systems remain operational.
Through the proactive monitoring, identifying, investigating, and resolving of technical incidents and problems, this role is able to restore service to clients.
The primary objective of this role is to proactively review client requests or tickets and apply technical/process knowledge to resolve them without breaching service level agreement (SLA) and focuses on second-line support for incidents and requests with a medium level of complexity.
The Security Managed Services Engineer (L2) may also contribute to / support on project work as and when required.
**What you'll be doing**
**Academic Qualifications and Certifications:**
+ BE/BTech in Electronics/EC/EE/CS/IT Engineering or MCA
+ At least one security certification such as CCNA Security, CCSA, CEH, CompTIA, GCIH/GCIA
**Required Experience:**
+ At least one SIEM solution certifications with one or more SIEM/ Security solutions (i.e., RSA NetWitness, Splunk ES, Elastic ELK, HP ArcSight, IBM QRadar Log Rhythm).
+ Minimum overall 5 years of experience in handling security related products & services in a reputed organization out of which 3 years' experience should be in SIEM solution.
+ Person should have adequate knowledge of security devices like firewalls, IPS, Web Application Firewall, DDOS, EDR, Incident response, SOAR and other security devices
+ Administration of SIEM environment (e.g.: deployment of solution, user management, managing the licenses, upgrades and patch deployment, addition or deletion of log sources, configuration management, change management, report management, manage backup and recovery, etc.)
+ Construction of SIEM content required to produce Content Outputs (e.g., filters, active lists, correlation rules, reports, report templates, queries, trends, variables)
+ Integration of customized threat intelligence content feeds provided by the Threat Intelligence & Analytics service
+ Identifies possible sensor improvements to prevent incidents
+ Collects/updates threat intelligence feeds from various sources
+ Creates situational awareness briefings
+ Co-ordinates with the different departments for incident analysis, containment and remediation
+ Liaise with Security monitoring team to discover repeatable process that lead to new content development
+ Provides engineering analysis and architectural design of technical solutions
+ Knowledge of networking protocols and technologies and network security
+ Sound analytical and troubleshooting skills
**Key Responsibilities:**
+ Monitors client infrastructure and solutions.
+ Identifies problems and errors prior to or when they occur.
+ Routinely identifies common incidents and opportunities for avoidance as well as general opportunities for incident reduction.
+ Investigates first line incidents assigned and identifies the root cause of incidents and problems.
+ Provides telephonic or chat support to clients when required.
+ Schedules maintenance activity windows for patching and configuration changes.
+ Follows the required handover procedures for shift changes to ensure service continuity.
+ Reports and escalates incidents where necessary.
+ Ensures the efficient and comprehensive resolutions of incidents and requests.
+ Updates existing knowledge articles or create new ones.
+ Identifies opportunities for work optimization including opportunities for automation of work, request fulfilment, incident resolution, and other general process improvement opportunities.
+ May also contribute to / support on project work as and when required.
+ May work on implementing and delivering Disaster Recovery functions and tests.
+ Performs any other related task as required.
**Workplace type** **:**
On-site Working
**About NTT DATA**
NTT DATA is a $30+ billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long-term success. We invest over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure, and connectivity. We are also one of the leading providers of digital and AI infrastructure in the world. NTT DATA is part of NTT Group and headquartered in Tokyo.
**Equal Opportunity Employer**
NTT DATA is proud to be an Equal Opportunity Employer with a global culture that embraces diversity. We are committed to providing an environment free of unfair discrimination and harassment. We do not discriminate based on age, race, colour, gender, sexual orientation, religion, nationality, disability, pregnancy, marital status, veteran status, or any other protected category. Join our growing global team and accelerate your career with us. Apply today.
Is this job a match or a miss?
This advertiser has chosen not to accept applicants from your region.

SOC Analyst (L1)

New Delhi, Delhi NTT America, Inc.

Posted today

Job Viewed

Tap Again To Close

Job Description

**Make an impact with NTT DATA**
Join a company that is pushing the boundaries of what is possible. We are renowned for our technical excellence and leading innovations, and for making a difference to our clients and society. Our workplace embraces diversity and inclusion - it's a place where you can grow, belong and thrive.
**Your day at NTT DATA**
The Security Managed Services Engineer (L1) is an entry level engineering role, responsible for providing a managed service to clients to ensure that their Firewall infrastructure remain operational through proactively identifying, investigating, and routing the incidents to correct resolver group.
The primary objective of this role is to ensure zero missed service level agreement (SLA) conditions and focuses on first-line support for standard and low complexity incidents and service requests.
The Security Managed Services Engineer (L1) may also contribute to / support on project work as and when required.
**What you'll be doing**
**Academic Qualifications and Certifications:**
+ BE/BTech in Electronics/EC/EE/CS/IT Engineering
+ At least one security certification such as CCNA Security, CCSA, CEH, CompTIA
**Required Experience:**
+ Minimum 2 years of experience in handling security related products & services and preferably SIEM solution.
+ Person should have adequate knowledge of security devices like firewalls, IPS, Web Application Firewall, DDOS, EDR, Incident response, SOAR and other security devices.
+ Construction of SIEM content required to produce Content Outputs (e.g., filters, active lists, correlation rules, reports, report templates, queries, trends, variables)
+ Knowledge of packet level analysis
+ Knowledge of networking protocols and technologies and network security
+ Sound analytical and troubleshooting skills
**Key Responsibilities:**
+ Monitors client infrastructure and solutions.
+ Identifies problems and errors prior to or when they occur.
+ Routinely identifies common incidents and opportunities for avoidance as well as general opportunities for incident reduction.
+ Investigates first line incidents assigned and identifies the root cause of incidents and problems.
+ Provides telephonic or chat support to clients when required.
+ Schedules maintenance activity windows for patching and configuration changes.
+ Follows the required handover procedures for shift changes to ensure service continuity.
+ Reports and escalates incidents where necessary.
+ Ensures the efficient and comprehensive resolutions of incidents and requests.
+ Updates existing knowledge articles or create new ones.
+ Identifies opportunities for work optimization including opportunities for automation of work, request fulfilment, incident resolution, and other general process improvement opportunities.
+ May also contribute to / support on project work as and when required.
+ May work on implementing and delivering Disaster Recovery functions and tests.
+ Performs any other related task as required.
**Workplace type** **:**
On-site Working
**About NTT DATA**
NTT DATA is a $30+ billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long-term success. We invest over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure, and connectivity. We are also one of the leading providers of digital and AI infrastructure in the world. NTT DATA is part of NTT Group and headquartered in Tokyo.
**Equal Opportunity Employer**
NTT DATA is proud to be an Equal Opportunity Employer with a global culture that embraces diversity. We are committed to providing an environment free of unfair discrimination and harassment. We do not discriminate based on age, race, colour, gender, sexual orientation, religion, nationality, disability, pregnancy, marital status, veteran status, or any other protected category. Join our growing global team and accelerate your career with us. Apply today.
Is this job a match or a miss?
This advertiser has chosen not to accept applicants from your region.

SOC Analyst (L1)

New Delhi, Delhi NTT America, Inc.

Posted today

Job Viewed

Tap Again To Close

Job Description

**Make an impact with NTT DATA**
Join a company that is pushing the boundaries of what is possible. We are renowned for our technical excellence and leading innovations, and for making a difference to our clients and society. Our workplace embraces diversity and inclusion - it's a place where you can grow, belong and thrive.
**Your day at NTT DATA**
The Security Managed Services Engineer (L1) is an entry level engineering role, responsible for providing a managed service to clients to ensure that their Firewall infrastructure remain operational through proactively identifying, investigating, and routing the incidents to correct resolver group.
The primary objective of this role is to ensure zero missed service level agreement (SLA) conditions and focuses on first-line support for standard and low complexity incidents and service requests.
The Security Managed Services Engineer (L1) may also contribute to / support on project work as and when required.
**What you'll be doing**
**Academic Qualifications and Certifications:**
+ BE/BTech in Electronics/EC/EE/CS/IT Engineering
+ At least one security certification such as CCNA Security, CCSA, CEH, CompTIA
**Required Experience:**
+ Minimum 2 years of experience in handling security related products & services and preferably SIEM solution.
+ Person should have adequate knowledge of security devices like firewalls, IPS, Web Application Firewall, DDOS, EDR, Incident response, SOAR and other security devices.
+ Construction of SIEM content required to produce Content Outputs (e.g., filters, active lists, correlation rules, reports, report templates, queries, trends, variables)
+ Knowledge of packet level analysis
+ Knowledge of networking protocols and technologies and network security
+ Sound analytical and troubleshooting skills
**Key Responsibilities:**
+ Monitors client infrastructure and solutions.
+ Identifies problems and errors prior to or when they occur.
+ Routinely identifies common incidents and opportunities for avoidance as well as general opportunities for incident reduction.
+ Investigates first line incidents assigned and identifies the root cause of incidents and problems.
+ Provides telephonic or chat support to clients when required.
+ Schedules maintenance activity windows for patching and configuration changes.
+ Follows the required handover procedures for shift changes to ensure service continuity.
+ Reports and escalates incidents where necessary.
+ Ensures the efficient and comprehensive resolutions of incidents and requests.
+ Updates existing knowledge articles or create new ones.
+ Identifies opportunities for work optimization including opportunities for automation of work, request fulfilment, incident resolution, and other general process improvement opportunities.
+ May also contribute to / support on project work as and when required.
+ May work on implementing and delivering Disaster Recovery functions and tests.
+ Performs any other related task as required.
**Workplace type** **:**
On-site Working
**About NTT DATA**
NTT DATA is a $30+ billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long-term success. We invest over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure, and connectivity. We are also one of the leading providers of digital and AI infrastructure in the world. NTT DATA is part of NTT Group and headquartered in Tokyo.
**Equal Opportunity Employer**
NTT DATA is proud to be an Equal Opportunity Employer with a global culture that embraces diversity. We are committed to providing an environment free of unfair discrimination and harassment. We do not discriminate based on age, race, colour, gender, sexual orientation, religion, nationality, disability, pregnancy, marital status, veteran status, or any other protected category. Join our growing global team and accelerate your career with us. Apply today.
Is this job a match or a miss?
This advertiser has chosen not to accept applicants from your region.

Senior SOC Analyst

Hyderabad, Andhra Pradesh HSBC

Posted today

Job Viewed

Tap Again To Close

Job Description

Senior SOC Analyst
Brand: HSBC
Area of Interest: Technology
Location:
Hyderabad, TG, IN,
Work style: Hybrid Worker
Date: 22 Oct 2025
Some careers shine brighter than others.
If you're looking for a career that will help you stand out, join HSBC and fulfil your potential. Whether you want a career that could take you to the top, or simply take you in an exciting new direction, HSBC offers opportunities, support and rewards that will take you further.
HSBC is one of the largest banking and financial services organisations in the world, with operations in 64 countries and territories. We aim to be where the growth is, enabling businesses to thrive and economies to prosper, and, ultimately, helping people to fulfil their hopes and realise their ambitions.
We are currently seeking an experienced professional to join our team in the role of Senior SOC Analyst
In this role, you will:
+ The primary responsibilities of the Senior SOC Analyst are:
+ Monitoring the entire global HSBC technology and information estate for new attacks and log them to appropriate systems.
+ Triaging potentially malicious events to determine severity and criticality of the event.
+ Responding to alerts from the various monitoring/detection systems and platforms within defined SLAs.
+ Following detailed processes and procedures to analyse, respond to and/or escalate cyber security incidents.
+ Supporting cyber security incidents through to eradication and feedback lessons learned, in to improved cyber resilience.
+ Analysing network traffic using a variety of analysis tools.
+ Monitoring security appliance health and perform basic troubleshooting of security devices; notify security engineering as necessary for malfunctioning equipment.
+ Analysing malicious artefacts obtained from network monitoring with a focus on generation of threat intelligence and service improvement.
+ Identifying and developing new ideas to enhance our detection capability (Use cases) and mitigations (Playbooks) across the security platforms.
+ Reviewing and validating new Use Cases and Playbooks created by Cybersecurity colleagues.
+ Researching emerging threats and vulnerabilities to aid in the identification of cyber incidents.
+ Applying structured analytical methodologies to maximize threat intelligence growth and service efficacy.
+ Supporting handovers to other teams and countries at the start and end of the working shift.
+ Contributing to the continued evolution of hunting, monitoring, detection, analysis and response capabilities and processes.
+ Training, developing and mentoring colleagues in area(s) of specialism.
+ Collaborating with the wider Cybersecurity (and IT) teams to ensure that the core, underlying technological capabilities that underpin an effective and efficient operational response to current and anticipated threats and trends remain fit for purpose.
+ Identifying processes that can be automated and orchestrated to ensure maximum efficiency of Global Cybersecurity Operations resources.
+ Promoting a "self-critical" and continuous assessment and improvement culture whereby identification of weaknesses in the bank's control plane (people, process, and technology) are brought to light and addressed in an effective and timely manner.
+ Supporting engagement in support of HSBC Global Businesses and Functions to drive a global up-lift in cyber-security awareness and help to evangelise HSBC Cybersecurity efforts and success.
Qualifications
To be successful in this role, you should meet the following requirements:
+ Experience working with Microsoft Identity technologies.
+ Good investigative skills and insatiable curiosity.
+ Instinctive and creative, with an ability to think like the enemy.
+ Strong problem-solving and trouble-shooting skills.
+ Strong communication and interpersonal skills, with proven ability to communicate technical topics to diverse audiences.
+ Strong decision-making capabilities, with a proven ability to weigh the relative costs and benefits of potential actions and identify the most appropriate one.
+ Ability to learn quickly through hands on experience.
+ Experience defining and refining operational procedures, workflows, and processes to support the team in consistent, quality execution of monitoring and detection.
+ An understanding of business needs and commitment to delivering high-quality, prompt, and efficient service to the business.
+ An understanding of organizational mission, values and goals and consistent application of this knowledge.
+ Self-motivated and possessing of a high sense of urgency and personal integrity.
+ Highest ethical standards and values.
+ Knowledge of cyber security principles, global financial services business models, regional compliance regulations and laws.
+ Good understanding and knowledge of common industry cyber security frameworks, standards and methodologies, including OWASP, ISO2700x series, PCI DSS, GLBA, EU data security and privacy acts, FFIEC guidelines, CIS and NIST standards
You'll achieve more when you join HSBC.
is committed to building a culture where all employees are valued, respected and opinions count. We take pride in providing a workplace that fosters continuous professional development, flexible working and opportunities to grow within an inclusive and diverse environment. Personal data held by the Bank relating to employment applications will be used in accordance with our Privacy Statement, which is available on our website.
Issued by - HSBC Software Development India
Is this job a match or a miss?
This advertiser has chosen not to accept applicants from your region.

Sr. SOC Analyst

Hyderabad, Andhra Pradesh NETSACH GLOBAL

Posted 15 days ago

Job Viewed

Tap Again To Close

Job Description

full-time

Greetings from Netsach - A Cyber Security Company.


Job Description

We are seeking a skilled and motivated Detection Engineer to join our Cyber Defense team. The ideal candidate will be responsible for developing, implementing, and maintaining detection mechanisms to identify and mitigate security threats. This role requires a deep understanding of cybersecurity principles, threat detection methodologies, and the ability to work in a fast-paced environment.


Job Title: Sr. SOC Analyst


Exp: 6+yrs

Job Type: Fulltime

Job Location: Hyderabad, Telangana, India


Please share your latest resume at & netsachglobal.com


Key Responsibilities:

  • Develop and implement advanced threat detection mechanisms to identify potential threats.
  • Continuously research and hunt for tactics, techniques, and procedures leveraged by advanced threat groups, as well as evidence pertaining to the exploitation of emerging vulnerabilities.
  • Collaborate with incident response teams to investigate and respond to security incidents may include off hours work.
  • Maintain and improve existing detection tools and systems.
  • Create and maintain documentation for detection processes and procedures.
  • Design playbooks and automations to improve efficiencies within the Threat Analysis team 
  • Assisting in other key security initiatives as required


Required Skills:

  • Bachelors degree in computer science, Information Security, or a related field or 6+ years performing detection engineering
  • Direct experience working with large datasets and log analysis tools including but not limited to: SIEM, EDR, Python, PowerShell, etc
  • Experience analyzing system, network, and application logs/telemetry for attack techniques at all stages of the cyber kill chain and ATT&CK framework
  • Experience with scripting languages (e.g., Python, PowerShell) for automation.
  • Excellent analytical and problem-solving skills.
  • Strong verbal and written communication skills 
  • Implementation and customization of Security Orchestration, Automation, and Response (SOAR) platforms.


Mandatory Skills

Bachelors degree in computer science, Information Security, or a related field or 6+ years performing detection engineering

Direct experience working with large datasets and log analysis tools including but not limited to: SIEM, EDR, Python, PowerShell, etc

Experience analyzing system, network, and application logs/telemetry for attack techniques at all stages of the cyber kill chain and ATT&CK framework

Experience with scripting languages (eg., Python, PowerShell) for automation

Implementation and customization of Security Orchestration, Automation, and Response (SOAR) platforms

Familiarity with cloud security platforms (eg., AWS, Azure).

Threat Research and Analysis

Threat detection


Preferred Skills:

  • Certifications such as CISSP, CEH, or GCIH, GMON, GDAT, GDSA, GNFA, etc.
  • Familiarity with cloud security platforms (e.g., AWS, Azure).
  • Experience with endpoint detection and response (EDR) tools.


Is this job a match or a miss?
This advertiser has chosen not to accept applicants from your region.

SOC Analyst L1

27378 CodeMax IT Solutions Pvt. Ltd.

Posted 639 days ago

Job Viewed

Tap Again To Close

Job Description

Permanent

Job responsibilities:

  • Monitor and analyze logs and alerts from a variety of different technologies across multiple platforms to identify and triage security incidents affecting the customers.
  • Provide Incident Response (IR) support for the incidents and alerts reported.
  • Use security tools and technologies to analyze potential threats to determine the impact, scope, and recovery of services.
  • Collaboration with internal and customer incident response teams.

Skills:

  • Understanding of logging mechanisms of Windows, and Linux. 
  • Basic knowledge of networking concepts is mandatory. 
  • Good communication skills to coordinate among various stakeholders of the organization 
  • Any certifications in networking & security concepts will be an added advantage 
  • Firewall, Antivirus
  • OSI Layer, ports, Natting 
  • System Architecture 
  • Cybersecurity Fundamentals
  • Analytical Thinking
  • MS Word & PPT for creating reports

Additional Skills:

  • Network Fundamentals
  • Security Tools Familiarity
  • Collaboration

Experience:  0-1 Years 

Is this job a match or a miss?
This advertiser has chosen not to accept applicants from your region.

Information Security Analyst - SOC

201310 Noida, Uttar Pradesh ₹700000 Annually WhatJobs Direct

Posted today

Job Viewed

Tap Again To Close

Job Description

full-time
Our client is actively recruiting for an Information Security Analyst to join their Security Operations Center (SOC) team. This role, located in Noida, Uttar Pradesh, IN , is crucial for maintaining the security posture of our client's extensive network infrastructure and sensitive data. The successful candidate will be responsible for monitoring, detecting, analyzing, and responding to security threats in real-time.

Responsibilities:
  • Monitor security alerts and events from various security tools, including SIEM, IDS/IPS, EDR, and firewalls.
  • Analyze security incidents to determine their nature, scope, and impact, and escalate as necessary.
  • Conduct investigations into suspicious activities and potential security breaches.
  • Respond to security incidents according to established playbooks and procedures, including containment, eradication, and recovery.
  • Develop and refine detection rules, correlation logic, and threat hunting methodologies within the SIEM.
  • Stay current with the latest threat intelligence, vulnerabilities, and attack techniques.
  • Collaborate with other IT and security teams to implement security enhancements and address identified risks.
  • Participate in on-call rotations for incident response.
  • Document incident details, actions taken, and lessons learned.
  • Contribute to the continuous improvement of SOC operations and processes.
  • Perform trend analysis of security events to identify systemic issues.
  • Assist in the development and maintenance of security documentation, including policies and procedures.
Qualifications:
  • Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field.
  • 2-4 years of experience in a Security Operations Center (SOC) or similar security monitoring role.
  • Strong understanding of networking concepts (TCP/IP, DNS, HTTP/S), operating systems (Windows, Linux), and common security threats.
  • Hands-on experience with SIEM solutions (e.g., Splunk, LogRhythm, QRadar).
  • Familiarity with Intrusion Detection/Prevention Systems (IDS/IPS) and Endpoint Detection and Response (EDR) tools.
  • Knowledge of common attack vectors and malware types.
  • Excellent analytical, problem-solving, and critical-thinking skills.
  • Effective communication skills, both written and verbal, for reporting and collaboration.
  • Ability to work in shifts and participate in an on-call schedule.
  • Relevant certifications such as CompTIA Security+, CEH, GIAC, or equivalent are a plus.
  • Proactive mindset and a keen interest in cybersecurity.
This hybrid role offers a competitive salary, comprehensive benefits, and significant opportunities for professional growth within a leading organization. Join our client in Noida, Uttar Pradesh, IN and become a vital part of their security defense.
Is this job a match or a miss?
This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest C soc analyst Jobs in India !

Information Security Analyst - SOC

395001 Surat, Gujarat ₹70000 Annually WhatJobs

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

full-time
Our client is seeking a vigilant and skilled Information Security Analyst to join their Security Operations Center (SOC). This role is pivotal in protecting the organization's digital assets from evolving cyber threats. The Analyst will be responsible for monitoring security alerts, investigating potential security incidents, and responding to threats in a timely and effective manner. Key duties include analyzing security logs, network traffic, and system behavior to detect anomalies and malicious activities. You will utilize various security tools and technologies, such as SIEM platforms, intrusion detection systems (IDS/IPS), and endpoint detection and response (EDR) solutions. Developing and refining detection rules, threat hunting methodologies, and incident response playbooks will be a significant part of your role. The successful candidate will collaborate closely with IT and other departments to understand vulnerabilities and implement mitigation strategies. Conducting root cause analysis for security incidents and providing detailed reports on findings, impact, and recommended remediation steps is crucial. Staying abreast of the latest threat intelligence, attack vectors, and cybersecurity trends is a must. This position offers a hybrid work model, allowing for a blend of remote flexibility and in-office collaboration at our facility in **Surat, Gujarat, IN**. You will contribute to maintaining the confidentiality, integrity, and availability of information systems. The ability to work shifts, including nights and weekends, may be required depending on the SOC's operational needs. A proactive approach to security and a commitment to continuous learning are highly valued.

Key Responsibilities:
  • Monitor and analyze security alerts from various sources.
  • Investigate and respond to security incidents and breaches.
  • Perform threat hunting to proactively identify malicious activities.
  • Utilize SIEM, IDS/IPS, and EDR tools for security monitoring.
  • Develop and tune security detection rules and policies.
  • Conduct root cause analysis of security incidents.
  • Prepare incident reports and recommendations for mitigation.
  • Collaborate with IT teams on security remediation.
  • Stay updated on emerging cybersecurity threats and trends.
Qualifications:
  • Bachelor's degree in Computer Science, Information Security, or a related field.
  • Proven experience in a SOC or information security role.
  • Familiarity with security tools like SIEM, IDS/IPS, firewalls, EDR.
  • Understanding of networking protocols and operating systems.
  • Knowledge of common attack vectors and mitigation techniques.
  • Strong analytical and problem-solving skills.
  • Excellent written and verbal communication skills.
  • Ability to work in a hybrid work environment.
  • Relevant security certifications (e.g., CompTIA Security+, CEH) are a plus.
This role offers an excellent opportunity to grow within the cybersecurity domain.
Is this job a match or a miss?
This advertiser has chosen not to accept applicants from your region.

Information Security Analyst - SOC

226001 Lucknow, Uttar Pradesh ₹1000000 Annually WhatJobs

Posted 3 days ago

Job Viewed

Tap Again To Close

Job Description

full-time
Our client is seeking a highly skilled Information Security Analyst to join their Security Operations Center (SOC). This role is crucial in monitoring, detecting, and responding to cybersecurity threats and incidents. You will be responsible for analyzing security alerts, investigating suspicious activities, and implementing measures to protect the organization's digital assets. This position demands a proactive approach to security, a strong understanding of threat landscapes, and the ability to work effectively under pressure.

Key Responsibilities:
  • Monitor security alerts and logs from various security tools (SIEM, IDS/IPS, WAF, EDR) to identify potential security incidents.
  • Analyze security events to determine the nature and scope of threats.
  • Perform incident response activities, including containment, eradication, and recovery.
  • Conduct forensic analysis of security incidents to identify root causes and recommend preventative measures.
  • Develop and maintain security procedures and documentation.
  • Stay up-to-date with the latest cybersecurity threats, vulnerabilities, and industry best practices.
  • Participate in threat hunting activities to proactively identify emerging threats.
  • Collaborate with IT and other teams to implement security controls and remediation strategies.
  • Generate regular reports on security incidents, trends, and metrics.
  • Assist in security awareness training for employees.
  • Contribute to the development and improvement of SOC tools and processes.
  • Maintain compliance with relevant security standards and regulations.

Qualifications:
  • Bachelor's degree in Computer Science, Information Security, Cybersecurity, or a related field.
  • Minimum of 3-5 years of experience in information security, preferably in a SOC environment.
  • Strong understanding of networking protocols, operating systems (Windows, Linux), and common security vulnerabilities.
  • Experience with SIEM tools (e.g., Splunk, QRadar, LogRhythm), IDS/IPS, and EDR solutions.
  • Familiarity with incident response frameworks (e.g., NIST).
  • Excellent analytical and problem-solving skills.
  • Ability to work in a 24/7 rotating shift environment (if applicable).
  • Strong communication and interpersonal skills.
  • Relevant certifications such as Security+, CEH, or CISSP are a plus.
  • Demonstrated ability to work independently and as part of a team.

Our client is committed to fostering a secure digital environment and offers competitive compensation and opportunities for professional development in the cybersecurity field.
Is this job a match or a miss?
This advertiser has chosen not to accept applicants from your region.

Information Security Analyst - SOC

440010 Nagpur, Maharashtra ₹65000 Annually WhatJobs

Posted 4 days ago

Job Viewed

Tap Again To Close

Job Description

full-time
Our client is seeking a vigilant and skilled Information Security Analyst to join their Security Operations Center (SOC) in **Nagpur, Maharashtra, IN**. This critical role involves continuous monitoring, detection, analysis, and response to cybersecurity threats and incidents. The Information Security Analyst will be responsible for operating and maintaining various security tools and technologies, including SIEM systems, intrusion detection/prevention systems (IDS/IPS), and endpoint detection and response (EDR) solutions. You will analyze security alerts, investigate potential breaches, and develop effective incident response strategies to minimize impact. Key duties include threat hunting, vulnerability assessment, and implementing security best practices. The ideal candidate will possess a Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field, coupled with hands-on experience in SOC operations. Strong knowledge of networking protocols, operating systems (Windows, Linux), and common cyber attack vectors is essential. Certifications such as CompTIA Security+, CEH, or CISSP are highly advantageous. Excellent analytical and problem-solving skills are required, as is the ability to work effectively under pressure in a 24/7 operational environment (shift work may be required). This position requires a dedicated on-site presence at our client's facility in **Nagpur, Maharashtra, IN**, contributing to the protection of vital information assets. A proactive approach to identifying and mitigating security risks is paramount for this role.
Is this job a match or a miss?
This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All C Soc Analyst Jobs