What Jobs are available for C Soc Analyst in India?
Showing 2662 C Soc Analyst jobs in India
SOC Analyst L2
Posted today
Job Viewed
Job Description
Join a company that is pushing the boundaries of what is possible. We are renowned for our technical excellence and leading innovations, and for making a difference to our clients and society. Our workplace embraces diversity and inclusion - it's a place where you can grow, belong and thrive.
**Your day at NTT DATA**
The Security Managed Services Engineer (L2) is a developing engineering role, responsible for providing a managed service to clients to ensure that their Security Infrastructures and systems remain operational.
Through the proactive monitoring, identifying, investigating, and resolving of technical incidents and problems, this role is able to restore service to clients.
The primary objective of this role is to proactively review client requests or tickets and apply technical/process knowledge to resolve them without breaching service level agreement (SLA) and focuses on second-line support for incidents and requests with a medium level of complexity.
The Security Managed Services Engineer (L2) may also contribute to / support on project work as and when required.
**What you'll be doing**
**Academic Qualifications and Certifications:**
+ BE/BTech in Electronics/EC/EE/CS/IT Engineering or MCA
+ At least one security certification such as CCNA Security, CCSA, CEH, CompTIA, GCIH/GCIA
**Required Experience:**
+ At least one SIEM solution certifications with one or more SIEM/ Security solutions (i.e., RSA NetWitness, Splunk ES, Elastic ELK, HP ArcSight, IBM QRadar Log Rhythm).
+ Minimum overall 5 years of experience in handling security related products & services in a reputed organization out of which 3 years' experience should be in SIEM solution.
+ Person should have adequate knowledge of security devices like firewalls, IPS, Web Application Firewall, DDOS, EDR, Incident response, SOAR and other security devices
+ Administration of SIEM environment (e.g.: deployment of solution, user management, managing the licenses, upgrades and patch deployment, addition or deletion of log sources, configuration management, change management, report management, manage backup and recovery, etc.)
+ Construction of SIEM content required to produce Content Outputs (e.g., filters, active lists, correlation rules, reports, report templates, queries, trends, variables)
+ Integration of customized threat intelligence content feeds provided by the Threat Intelligence & Analytics service
+ Identifies possible sensor improvements to prevent incidents
+ Collects/updates threat intelligence feeds from various sources
+ Creates situational awareness briefings
+ Co-ordinates with the different departments for incident analysis, containment and remediation
+ Liaise with Security monitoring team to discover repeatable process that lead to new content development
+ Provides engineering analysis and architectural design of technical solutions
+ Knowledge of networking protocols and technologies and network security
+ Sound analytical and troubleshooting skills
**Key Responsibilities:**
+ Monitors client infrastructure and solutions.
+ Identifies problems and errors prior to or when they occur.
+ Routinely identifies common incidents and opportunities for avoidance as well as general opportunities for incident reduction.
+ Investigates first line incidents assigned and identifies the root cause of incidents and problems.
+ Provides telephonic or chat support to clients when required.
+ Schedules maintenance activity windows for patching and configuration changes.
+ Follows the required handover procedures for shift changes to ensure service continuity.
+ Reports and escalates incidents where necessary.
+ Ensures the efficient and comprehensive resolutions of incidents and requests.
+ Updates existing knowledge articles or create new ones.
+ Identifies opportunities for work optimization including opportunities for automation of work, request fulfilment, incident resolution, and other general process improvement opportunities.
+ May also contribute to / support on project work as and when required.
+ May work on implementing and delivering Disaster Recovery functions and tests.
+ Performs any other related task as required.
**Workplace type** **:**
On-site Working
**About NTT DATA**
NTT DATA is a $30+ billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long-term success. We invest over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure, and connectivity. We are also one of the leading providers of digital and AI infrastructure in the world. NTT DATA is part of NTT Group and headquartered in Tokyo.
**Equal Opportunity Employer**
NTT DATA is proud to be an Equal Opportunity Employer with a global culture that embraces diversity. We are committed to providing an environment free of unfair discrimination and harassment. We do not discriminate based on age, race, colour, gender, sexual orientation, religion, nationality, disability, pregnancy, marital status, veteran status, or any other protected category. Join our growing global team and accelerate your career with us. Apply today.
Is this job a match or a miss?
SOC Analyst (L1)
Posted today
Job Viewed
Job Description
Join a company that is pushing the boundaries of what is possible. We are renowned for our technical excellence and leading innovations, and for making a difference to our clients and society. Our workplace embraces diversity and inclusion - it's a place where you can grow, belong and thrive.
**Your day at NTT DATA**
The Security Managed Services Engineer (L1) is an entry level engineering role, responsible for providing a managed service to clients to ensure that their Firewall infrastructure remain operational through proactively identifying, investigating, and routing the incidents to correct resolver group.
The primary objective of this role is to ensure zero missed service level agreement (SLA) conditions and focuses on first-line support for standard and low complexity incidents and service requests.
The Security Managed Services Engineer (L1) may also contribute to / support on project work as and when required.
**What you'll be doing**
**Academic Qualifications and Certifications:**
+ BE/BTech in Electronics/EC/EE/CS/IT Engineering
+ At least one security certification such as CCNA Security, CCSA, CEH, CompTIA
**Required Experience:**
+ Minimum 2 years of experience in handling security related products & services and preferably SIEM solution.
+ Person should have adequate knowledge of security devices like firewalls, IPS, Web Application Firewall, DDOS, EDR, Incident response, SOAR and other security devices.
+ Construction of SIEM content required to produce Content Outputs (e.g., filters, active lists, correlation rules, reports, report templates, queries, trends, variables)
+ Knowledge of packet level analysis
+ Knowledge of networking protocols and technologies and network security
+ Sound analytical and troubleshooting skills
**Key Responsibilities:**
+ Monitors client infrastructure and solutions.
+ Identifies problems and errors prior to or when they occur.
+ Routinely identifies common incidents and opportunities for avoidance as well as general opportunities for incident reduction.
+ Investigates first line incidents assigned and identifies the root cause of incidents and problems.
+ Provides telephonic or chat support to clients when required.
+ Schedules maintenance activity windows for patching and configuration changes.
+ Follows the required handover procedures for shift changes to ensure service continuity.
+ Reports and escalates incidents where necessary.
+ Ensures the efficient and comprehensive resolutions of incidents and requests.
+ Updates existing knowledge articles or create new ones.
+ Identifies opportunities for work optimization including opportunities for automation of work, request fulfilment, incident resolution, and other general process improvement opportunities.
+ May also contribute to / support on project work as and when required.
+ May work on implementing and delivering Disaster Recovery functions and tests.
+ Performs any other related task as required.
**Workplace type** **:**
On-site Working
**About NTT DATA**
NTT DATA is a $30+ billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long-term success. We invest over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure, and connectivity. We are also one of the leading providers of digital and AI infrastructure in the world. NTT DATA is part of NTT Group and headquartered in Tokyo.
**Equal Opportunity Employer**
NTT DATA is proud to be an Equal Opportunity Employer with a global culture that embraces diversity. We are committed to providing an environment free of unfair discrimination and harassment. We do not discriminate based on age, race, colour, gender, sexual orientation, religion, nationality, disability, pregnancy, marital status, veteran status, or any other protected category. Join our growing global team and accelerate your career with us. Apply today.
Is this job a match or a miss?
SOC Analyst (L1)
Posted today
Job Viewed
Job Description
Join a company that is pushing the boundaries of what is possible. We are renowned for our technical excellence and leading innovations, and for making a difference to our clients and society. Our workplace embraces diversity and inclusion - it's a place where you can grow, belong and thrive.
**Your day at NTT DATA**
The Security Managed Services Engineer (L1) is an entry level engineering role, responsible for providing a managed service to clients to ensure that their Firewall infrastructure remain operational through proactively identifying, investigating, and routing the incidents to correct resolver group.
The primary objective of this role is to ensure zero missed service level agreement (SLA) conditions and focuses on first-line support for standard and low complexity incidents and service requests.
The Security Managed Services Engineer (L1) may also contribute to / support on project work as and when required.
**What you'll be doing**
**Academic Qualifications and Certifications:**
+ BE/BTech in Electronics/EC/EE/CS/IT Engineering
+ At least one security certification such as CCNA Security, CCSA, CEH, CompTIA
**Required Experience:**
+ Minimum 2 years of experience in handling security related products & services and preferably SIEM solution.
+ Person should have adequate knowledge of security devices like firewalls, IPS, Web Application Firewall, DDOS, EDR, Incident response, SOAR and other security devices.
+ Construction of SIEM content required to produce Content Outputs (e.g., filters, active lists, correlation rules, reports, report templates, queries, trends, variables)
+ Knowledge of packet level analysis
+ Knowledge of networking protocols and technologies and network security
+ Sound analytical and troubleshooting skills
**Key Responsibilities:**
+ Monitors client infrastructure and solutions.
+ Identifies problems and errors prior to or when they occur.
+ Routinely identifies common incidents and opportunities for avoidance as well as general opportunities for incident reduction.
+ Investigates first line incidents assigned and identifies the root cause of incidents and problems.
+ Provides telephonic or chat support to clients when required.
+ Schedules maintenance activity windows for patching and configuration changes.
+ Follows the required handover procedures for shift changes to ensure service continuity.
+ Reports and escalates incidents where necessary.
+ Ensures the efficient and comprehensive resolutions of incidents and requests.
+ Updates existing knowledge articles or create new ones.
+ Identifies opportunities for work optimization including opportunities for automation of work, request fulfilment, incident resolution, and other general process improvement opportunities.
+ May also contribute to / support on project work as and when required.
+ May work on implementing and delivering Disaster Recovery functions and tests.
+ Performs any other related task as required.
**Workplace type** **:**
On-site Working
**About NTT DATA**
NTT DATA is a $30+ billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long-term success. We invest over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure, and connectivity. We are also one of the leading providers of digital and AI infrastructure in the world. NTT DATA is part of NTT Group and headquartered in Tokyo.
**Equal Opportunity Employer**
NTT DATA is proud to be an Equal Opportunity Employer with a global culture that embraces diversity. We are committed to providing an environment free of unfair discrimination and harassment. We do not discriminate based on age, race, colour, gender, sexual orientation, religion, nationality, disability, pregnancy, marital status, veteran status, or any other protected category. Join our growing global team and accelerate your career with us. Apply today.
Is this job a match or a miss?
Senior SOC Analyst
Posted today
Job Viewed
Job Description
Brand: HSBC
Area of Interest: Technology
Location:
Hyderabad, TG, IN,
Work style: Hybrid Worker
Date: 22 Oct 2025
Some careers shine brighter than others.
If you're looking for a career that will help you stand out, join HSBC and fulfil your potential. Whether you want a career that could take you to the top, or simply take you in an exciting new direction, HSBC offers opportunities, support and rewards that will take you further.
HSBC is one of the largest banking and financial services organisations in the world, with operations in 64 countries and territories. We aim to be where the growth is, enabling businesses to thrive and economies to prosper, and, ultimately, helping people to fulfil their hopes and realise their ambitions.
We are currently seeking an experienced professional to join our team in the role of Senior SOC Analyst
In this role, you will:
+ The primary responsibilities of the Senior SOC Analyst are:
+ Monitoring the entire global HSBC technology and information estate for new attacks and log them to appropriate systems.
+ Triaging potentially malicious events to determine severity and criticality of the event.
+ Responding to alerts from the various monitoring/detection systems and platforms within defined SLAs.
+ Following detailed processes and procedures to analyse, respond to and/or escalate cyber security incidents.
+ Supporting cyber security incidents through to eradication and feedback lessons learned, in to improved cyber resilience.
+ Analysing network traffic using a variety of analysis tools.
+ Monitoring security appliance health and perform basic troubleshooting of security devices; notify security engineering as necessary for malfunctioning equipment.
+ Analysing malicious artefacts obtained from network monitoring with a focus on generation of threat intelligence and service improvement.
+ Identifying and developing new ideas to enhance our detection capability (Use cases) and mitigations (Playbooks) across the security platforms.
+ Reviewing and validating new Use Cases and Playbooks created by Cybersecurity colleagues.
+ Researching emerging threats and vulnerabilities to aid in the identification of cyber incidents.
+ Applying structured analytical methodologies to maximize threat intelligence growth and service efficacy.
+ Supporting handovers to other teams and countries at the start and end of the working shift.
+ Contributing to the continued evolution of hunting, monitoring, detection, analysis and response capabilities and processes.
+ Training, developing and mentoring colleagues in area(s) of specialism.
+ Collaborating with the wider Cybersecurity (and IT) teams to ensure that the core, underlying technological capabilities that underpin an effective and efficient operational response to current and anticipated threats and trends remain fit for purpose.
+ Identifying processes that can be automated and orchestrated to ensure maximum efficiency of Global Cybersecurity Operations resources.
+ Promoting a "self-critical" and continuous assessment and improvement culture whereby identification of weaknesses in the bank's control plane (people, process, and technology) are brought to light and addressed in an effective and timely manner.
+ Supporting engagement in support of HSBC Global Businesses and Functions to drive a global up-lift in cyber-security awareness and help to evangelise HSBC Cybersecurity efforts and success.
Qualifications
To be successful in this role, you should meet the following requirements:
+ Experience working with Microsoft Identity technologies.
+ Good investigative skills and insatiable curiosity.
+ Instinctive and creative, with an ability to think like the enemy.
+ Strong problem-solving and trouble-shooting skills.
+ Strong communication and interpersonal skills, with proven ability to communicate technical topics to diverse audiences.
+ Strong decision-making capabilities, with a proven ability to weigh the relative costs and benefits of potential actions and identify the most appropriate one.
+ Ability to learn quickly through hands on experience.
+ Experience defining and refining operational procedures, workflows, and processes to support the team in consistent, quality execution of monitoring and detection.
+ An understanding of business needs and commitment to delivering high-quality, prompt, and efficient service to the business.
+ An understanding of organizational mission, values and goals and consistent application of this knowledge.
+ Self-motivated and possessing of a high sense of urgency and personal integrity.
+ Highest ethical standards and values.
+ Knowledge of cyber security principles, global financial services business models, regional compliance regulations and laws.
+ Good understanding and knowledge of common industry cyber security frameworks, standards and methodologies, including OWASP, ISO2700x series, PCI DSS, GLBA, EU data security and privacy acts, FFIEC guidelines, CIS and NIST standards
You'll achieve more when you join HSBC.
is committed to building a culture where all employees are valued, respected and opinions count. We take pride in providing a workplace that fosters continuous professional development, flexible working and opportunities to grow within an inclusive and diverse environment. Personal data held by the Bank relating to employment applications will be used in accordance with our Privacy Statement, which is available on our website.
Issued by - HSBC Software Development India
Is this job a match or a miss?
Sr. SOC Analyst
Posted 15 days ago
Job Viewed
Job Description
Greetings from Netsach - A Cyber Security Company.
Job Description
We are seeking a skilled and motivated Detection Engineer to join our Cyber Defense team. The ideal candidate will be responsible for developing, implementing, and maintaining detection mechanisms to identify and mitigate security threats. This role requires a deep understanding of cybersecurity principles, threat detection methodologies, and the ability to work in a fast-paced environment.
Job Title: Sr. SOC Analyst
Exp: 6+yrs
Job Type: Fulltime
Job Location: Hyderabad, Telangana, India
Please share your latest resume at & netsachglobal.com
Key Responsibilities:
- Develop and implement advanced threat detection mechanisms to identify potential threats.
- Continuously research and hunt for tactics, techniques, and procedures leveraged by advanced threat groups, as well as evidence pertaining to the exploitation of emerging vulnerabilities.
- Collaborate with incident response teams to investigate and respond to security incidents may include off hours work.
- Maintain and improve existing detection tools and systems.
- Create and maintain documentation for detection processes and procedures.
- Design playbooks and automations to improve efficiencies within the Threat Analysis team
- Assisting in other key security initiatives as required
Required Skills:
- Bachelors degree in computer science, Information Security, or a related field or 6+ years performing detection engineering
- Direct experience working with large datasets and log analysis tools including but not limited to: SIEM, EDR, Python, PowerShell, etc
- Experience analyzing system, network, and application logs/telemetry for attack techniques at all stages of the cyber kill chain and ATT&CK framework
- Experience with scripting languages (e.g., Python, PowerShell) for automation.
- Excellent analytical and problem-solving skills.
- Strong verbal and written communication skills
- Implementation and customization of Security Orchestration, Automation, and Response (SOAR) platforms.
Mandatory Skills
Bachelors degree in computer science, Information Security, or a related field or 6+ years performing detection engineering
Direct experience working with large datasets and log analysis tools including but not limited to: SIEM, EDR, Python, PowerShell, etc
Experience analyzing system, network, and application logs/telemetry for attack techniques at all stages of the cyber kill chain and ATT&CK framework
Experience with scripting languages (eg., Python, PowerShell) for automation
Implementation and customization of Security Orchestration, Automation, and Response (SOAR) platforms
Familiarity with cloud security platforms (eg., AWS, Azure).
Threat Research and Analysis
Threat detection
Preferred Skills:
- Certifications such as CISSP, CEH, or GCIH, GMON, GDAT, GDSA, GNFA, etc.
- Familiarity with cloud security platforms (e.g., AWS, Azure).
- Experience with endpoint detection and response (EDR) tools.
Is this job a match or a miss?
SOC Analyst L1
Posted 639 days ago
Job Viewed
Job Description
Job responsibilities:
- Monitor and analyze logs and alerts from a variety of different technologies across multiple platforms to identify and triage security incidents affecting the customers.
- Provide Incident Response (IR) support for the incidents and alerts reported.
- Use security tools and technologies to analyze potential threats to determine the impact, scope, and recovery of services.
- Collaboration with internal and customer incident response teams.
Skills:
- Understanding of logging mechanisms of Windows, and Linux.
- Basic knowledge of networking concepts is mandatory.
- Good communication skills to coordinate among various stakeholders of the organization
- Any certifications in networking & security concepts will be an added advantage
- Firewall, Antivirus
- OSI Layer, ports, Natting
- System Architecture
- Cybersecurity Fundamentals
- Analytical Thinking
- MS Word & PPT for creating reports
Additional Skills:
- Network Fundamentals
- Security Tools Familiarity
- Collaboration
Experience: 0-1 Years
Is this job a match or a miss?
Information Security Analyst - SOC
Posted today
Job Viewed
Job Description
Responsibilities:
- Monitor security alerts and events from various security tools, including SIEM, IDS/IPS, EDR, and firewalls.
- Analyze security incidents to determine their nature, scope, and impact, and escalate as necessary.
- Conduct investigations into suspicious activities and potential security breaches.
- Respond to security incidents according to established playbooks and procedures, including containment, eradication, and recovery.
- Develop and refine detection rules, correlation logic, and threat hunting methodologies within the SIEM.
- Stay current with the latest threat intelligence, vulnerabilities, and attack techniques.
- Collaborate with other IT and security teams to implement security enhancements and address identified risks.
- Participate in on-call rotations for incident response.
- Document incident details, actions taken, and lessons learned.
- Contribute to the continuous improvement of SOC operations and processes.
- Perform trend analysis of security events to identify systemic issues.
- Assist in the development and maintenance of security documentation, including policies and procedures.
- Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field.
- 2-4 years of experience in a Security Operations Center (SOC) or similar security monitoring role.
- Strong understanding of networking concepts (TCP/IP, DNS, HTTP/S), operating systems (Windows, Linux), and common security threats.
- Hands-on experience with SIEM solutions (e.g., Splunk, LogRhythm, QRadar).
- Familiarity with Intrusion Detection/Prevention Systems (IDS/IPS) and Endpoint Detection and Response (EDR) tools.
- Knowledge of common attack vectors and malware types.
- Excellent analytical, problem-solving, and critical-thinking skills.
- Effective communication skills, both written and verbal, for reporting and collaboration.
- Ability to work in shifts and participate in an on-call schedule.
- Relevant certifications such as CompTIA Security+, CEH, GIAC, or equivalent are a plus.
- Proactive mindset and a keen interest in cybersecurity.
Is this job a match or a miss?
Be The First To Know
About the latest C soc analyst Jobs in India !
Information Security Analyst - SOC
Posted 2 days ago
Job Viewed
Job Description
Key Responsibilities:
- Monitor and analyze security alerts from various sources.
- Investigate and respond to security incidents and breaches.
- Perform threat hunting to proactively identify malicious activities.
- Utilize SIEM, IDS/IPS, and EDR tools for security monitoring.
- Develop and tune security detection rules and policies.
- Conduct root cause analysis of security incidents.
- Prepare incident reports and recommendations for mitigation.
- Collaborate with IT teams on security remediation.
- Stay updated on emerging cybersecurity threats and trends.
- Bachelor's degree in Computer Science, Information Security, or a related field.
- Proven experience in a SOC or information security role.
- Familiarity with security tools like SIEM, IDS/IPS, firewalls, EDR.
- Understanding of networking protocols and operating systems.
- Knowledge of common attack vectors and mitigation techniques.
- Strong analytical and problem-solving skills.
- Excellent written and verbal communication skills.
- Ability to work in a hybrid work environment.
- Relevant security certifications (e.g., CompTIA Security+, CEH) are a plus.
Is this job a match or a miss?
Information Security Analyst - SOC
Posted 3 days ago
Job Viewed
Job Description
Key Responsibilities:
- Monitor security alerts and logs from various security tools (SIEM, IDS/IPS, WAF, EDR) to identify potential security incidents.
- Analyze security events to determine the nature and scope of threats.
- Perform incident response activities, including containment, eradication, and recovery.
- Conduct forensic analysis of security incidents to identify root causes and recommend preventative measures.
- Develop and maintain security procedures and documentation.
- Stay up-to-date with the latest cybersecurity threats, vulnerabilities, and industry best practices.
- Participate in threat hunting activities to proactively identify emerging threats.
- Collaborate with IT and other teams to implement security controls and remediation strategies.
- Generate regular reports on security incidents, trends, and metrics.
- Assist in security awareness training for employees.
- Contribute to the development and improvement of SOC tools and processes.
- Maintain compliance with relevant security standards and regulations.
Qualifications:
- Bachelor's degree in Computer Science, Information Security, Cybersecurity, or a related field.
- Minimum of 3-5 years of experience in information security, preferably in a SOC environment.
- Strong understanding of networking protocols, operating systems (Windows, Linux), and common security vulnerabilities.
- Experience with SIEM tools (e.g., Splunk, QRadar, LogRhythm), IDS/IPS, and EDR solutions.
- Familiarity with incident response frameworks (e.g., NIST).
- Excellent analytical and problem-solving skills.
- Ability to work in a 24/7 rotating shift environment (if applicable).
- Strong communication and interpersonal skills.
- Relevant certifications such as Security+, CEH, or CISSP are a plus.
- Demonstrated ability to work independently and as part of a team.
Our client is committed to fostering a secure digital environment and offers competitive compensation and opportunities for professional development in the cybersecurity field.
Is this job a match or a miss?
Information Security Analyst - SOC
Posted 4 days ago
Job Viewed
Job Description
Is this job a match or a miss?