4,356 Security Intern jobs in India

Security Operations Manager

Tradeweb

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

**Company Description**
Tradeweb Markets is a world leader in the evolution of electronic trading. A fintech company serving approximately 2,500 clients - including the world's largest banks, asset managers, hedge funds, insurance companies, wealth managers and retail clients -- in more than 65 countries across the globe. Since our first trade in 1998, we have helped transform and electronify the fixed income markets. Tradeweb is a culture built on innovation, creativity and collaboration. Through a combination of very talented and driven people, innovative products and solutions, cutting-edge technology, market data, and a vast network of clients, we continue to work together to improve the way financial markets trade.
Mission: Move first and never stop. Collaborate with clients to create and build solutions that drive efficiency, connectivity, and transparency in electronic trading.
Tradeweb Markets LLC ("Tradeweb") is proud to be an EEO Minorities/Females/Protected Veterans/Disabled/Affirmative Action Employer.
Details**
Tradeweb's Security Operations team is on the front lines, protecting Tradeweb's clients and employees from the constantly evolving threat landscape. This role will help support and enhance our existing Security Operations program as part of our transformation into a hybrid operating model. The ideal candidate will have a combination of hands-on, technical experience and excellent written and verbal communication skills to explain complex issues in non-technical terms. The role will also have a chance to work with subject matter experts within cyber security, across infrastructure, data analytics, application development, and business teams.   
**Job Responsibilities**
- Reporting to the Director of Security Operations, this role will oversee a team of security operations (SOC) engineers that provide 24x7x365 detection and response capabilities for Tradeweb.
- Mature existing processes to provide measurable results across SecOps OKRs.
- As a member of Tradeweb's technical incident response team, you will be responsible for executing Tradeweb's technical incident response process focusing on disk/memory forensics, log analysis, evidence handling and formal report creation.
- Collaborate with Tradeweb's Cyber Threat Intelligence teams to ensure operations engineers are aware of current threat actor tools, techniques and procedures (TTPs).
- Manage relationships with critical security vendors in local regions to ensure they are providing a level of excellence in line with Tradeweb standards.
- Train and mentor security engineers, primarily focused on incident response, threat hunting, and security automation.
- Build internal partnerships with key business stakeholders, particularly those in our Compliance, Infrastructure, and Risk organizations.
- Publish related metrics, key performance indicators (KPIs) and key risk indicators (KRIs) as well as providing regular updates to the senior management.
**Qualifications**
- Minimum of 10 years of combined experience in information security and related technical disciplines, with at least 6 years focusing on security operations, incident response or cyber threat investigations.
- In-depth experience with Windows and Unix operating environments with a focus on disk and memory forensic analysis.
- Demonstrated experience leading and maturing security teams with a deep technical focus.
- Strong knowledge of SIEM technologies and hands-on experience with at least one of the following technologies: Splunk, ELK, XSIAM, QRadar.
- Ability to translate and operationalize technical, legal, and compliance requirements in a heavily regulated environment.
- Clear and concise communicator, can articulate cyber risk and impact across a wide range of audiences, to ensure decision makers have the information they need.
- Deep knowledge of network security architecture, internet protocols and web service technologies.
- Financial services experience is preferable, or experience in the financial technology (FinTech) area
- CISSP, CISM or equivalent qualifications preferred.
This advertiser has chosen not to accept applicants from your region.

Security Operations Analyst

Bengaluru, Karnataka Insight Global

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

Job Summary

We are seeking a Security Operations Center (SOC) Analyst with hands-on experience in Secureworks Taegis and Microsoft Defender (Endpoint, Identity, and Cloud) to join our cybersecurity team. This role is critical for monitoring, analyzing, and responding to security threats across cloud and hybrid environments. The ideal candidate will thrive in high-pressure situations, collaborate across teams, and leverage SIEM/SOAR capabilities to enhance threat detection and response.

Key Responsibilities

  • Monitor and triage security alerts using Secureworks Taegis and Microsoft Defender , including detection rule authoring and alert enrichment.
  • Investigate incidents across cloud, network, and endpoint environments using Secureworks case management and Defender telemetry.
  • Develop and maintain log ingestion pipelines using tools like Cribl or Logstash for Secureworks integration.
  • Collaborate with Tier-2/3 analysts and threat intelligence teams to refine detection rules and reduce false positives.
  • Participate in incident response activities , including containment, eradication, and recovery.
  • Create and maintain SOC playbooks and automation workflows using Secureworks SOAR and Microsoft security automation capabilities.
  • Conduct packet analysis, malware triage, and forensic investigations as needed.
  • Stay current on threat landscapes, compliance standards (e.g., MITRE ATT&CK, GDPR, PCI-DSS), and emerging security technologies.

Required Skills

  • 7-10 years of experience in a SOC or cybersecurity operations role.
  • Proficiency with Secureworks Taegis and Microsoft Defender (Endpoint, Identity, Cloud), including rule tuning, log analysis, and case management.
  • Experience with SIEM tools (e.g., Splunk, QRadar, Elastic Stack) and SOAR platforms.
  • Strong understanding of TCP/IP, DNS, HTTP/S , and other network protocols.
  • Familiarity with endpoint detection tools (e.g., Defender for Endpoint), IDS/IPS, and vulnerability scanners (e.g., Nessus, Qualys).
  • Scripting skills in Python, Bash, or PowerShell for automation and data parsing.

Preferred Qualifications

  • Bachelor’s degree in Cybersecurity, Computer Science, or related field.
  • Certifications such as CompTIA Security+ , GIAC (GCIH, GCIA) , CEH , or Microsoft Security certifications (e.g., SC-200, SC-300).
  • Prior experience supporting federal or financial clients .
  • Experience with red/blue/purple team exercises and threat hunting .


This position will pay $10-15/hour and is located in Bangalore India.

This advertiser has chosen not to accept applicants from your region.

Security Operations Center

Pune, Maharashtra Peoplefy

Posted 5 days ago

Job Viewed

Tap Again To Close

Job Description

Hi Everyone,


I am on lookout for Security Operations Center - Specialist for leading product based MNC in Pune, Kharadi.


Kindly refer below JD & share your resume on


Job description:


● 5+ years of overall experience

● Experience with SOC, Threat Monitoring

● Experience with Threat & vulnerability management.

● Experience with SIEM tools like : Splunk, Azure Sentinel, EDR & MS Defender.


● Looking for candidates who can join as Immediate Joiner or within 30 days

This advertiser has chosen not to accept applicants from your region.

Security Operations Engineering IC3

Hyderabad, Andhra Pradesh Microsoft Corporation

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

Do you love the excitement and learning opportunity to study, analyse and deal with the most complex threats to digital security in today's world? Do you have the "learner" mindset, are willing to un-learn old skills and learn new ones every day? Are you excited by the potential of influencing the state of security of our entire company, every day? If yes, then this opportunity is for you.
Responsible for the installation, maintenance, support and optimization of all security-related components Facilitate incident response and forensic investigations Apply countermeasures to mitigate evolving security threats Work with other teams to ensure platform hardening, security maintenance, and vulnerability remediation procedures are followed Special Requirements Proficiency in KQL query and in a scripting language, preferably perl, PHP, or python a plus Must demonstrate basic knowledge of knowledge of Linux, Mac, and Strong understanding of Windows operating systems and networking protocols.
About CDO - Cyber Defense Operations. An organization led by Microsoft's Chief Information Security Officer enables Microsoft to deliver the most trusted devices and services. CDO's vision is to ensure all information and services are protected, secured, and available for appropriate use through innovation and a robust risk framework.
**Responsibilities**
+ Technical Insight: Provides technical insight on incident analysis and management, threat mitigation, forensics, malware analysis, and automation.
+ KRA and KPI Management: Ensures strong Key Result Areas (KRA) and Key Performance Indicators (KPI) management.
+ Collaboration: Embraces the values of Microsoft through coaching and collaboration, and partners with peer teams working in similar areas.
+ Stakeholder Management: Manages critical stakeholder calls and meetings (including non-business hours) while addressing critical security incidents.
+ Security Knowledge: Possesses extensive hands-on knowledge of security concepts including cyber-attacks, techniques, threat vectors, risk management, and incident management.
+ Automation Opportunities: Discovers potential automation opportunities or insights to enhance operational efficiency.
+ Product Collaboration: Collaborates and advises product teams on enhancing Microsoft's first-party security products by offering actionable feedback for improvement.
+ Team Environment: Cultivates a positive and inclusive team environment.
+ Operational Rigor: Demonstrates exceptional operational rigor with real-world experience in cyber security operations, threat mitigation and incident response.
+ Communication Skills: Exhibits excellent technical writing and oral communication skills.
+ Problem-Solving: Shows a systematic problem-solving mindset.
**Qualifications**
+ 8+ years of work experience, with a minimum of 6 years of experience in SOC.
+ Minimum 4 years of experience in Azure/Cloud
+ Hands on experience with incident analysis, Threat Actor related incident handling, Large Scale incident responder and Threat Hunting.
+ Understanding of Windows internals, Linux and Mac OS.
+ Understanding of various attack methods, vulnerabilities, exploits, malware.
+ Good Understanding of SIEM Console and tools such as Sentinel, Splunk, Qradar etc
+ Social engineering - given that humans are the weakest link in the security chain, an analyst's expertise can help with awareness training
+ Security assessments of network infrastructure, hosts and applications - another element of risk management.
+ Conduct root cause analysis and post-incident reviews.
+ Assist in tuning and optimizing detection rules and alerts.
+ Forensics - investigation and analysis of how and why a breach or other compromise occurred.
+ Develop and maintain incident response playbooks and standard operating procedures (SOPs).
+ Collaborate with IT, DevOps, and other teams to remediate vulnerabilities and improve security controls.
+ Troubleshooting - the skill to recognize the cause of a problem
+ DLP, AV, FIM, web proxy, email proxy, etc. - a comprehensive understanding of the tools utilized to protect the organization.
+ Excellent written and oral communication skills.
+ Security certifications such as GCIH, GCFA, GREM, CySA+ Knowledge of Azure Sentinel and KQL query is a must and added advantage.
+ Exposure to threat intelligence platforms and SOAR tools.
+ Knowledge of MITRE ATT&CK framework and incident response methodologies.
Microsoft is an equal opportunity employer. Consistent with applicable law, all qualified applicants will receive consideration for employment without regard to age, ancestry, citizenship, color, family or medical care leave, gender identity or expression, genetic information, immigration status, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran or military status, race, ethnicity, religion, sex (including pregnancy), sexual orientation, or any other characteristic protected by applicable local laws, regulations and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application process, read more about requesting accommodations ( .
This advertiser has chosen not to accept applicants from your region.

Cloud Security Operations Engineer

Bengaluru, Karnataka Automation Anywhere, Inc.

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

**About Us**
Automation Anywhere is the leader in Agentic Process Automation (APA), transforming how work gets done with AI-powered automation. Its APA system, built on the industry's first Process Reasoning Engine (PRE) and specialized AI agents, combines process discovery, RPA, end-to-end orchestration, document processing, and analytics-all delivered with enterprise-grade security and governance. Guided by its vision to fuel the future of work, Automation Anywhere helps organizations worldwide boost productivity, accelerate growth, and unleash human potential.
**Role Overview:**
As a Cloud Security Engineer, you'll be responsible for designing, implementing, and maintaining robust security controls across our multi-cloud environments. You'll work closely with SecOps, SOC, Product, IT, DevOps, and Compliance teams to ensure our cloud infrastructure meets the highest standards of security, privacy, and resilience.
This is a hands-on role for someone who thrives in a fast-paced environment and is passionate about building secure, scalable systems that support global enterprise customers.
**Primary Responsibilities:**  
+ Architect and implement cloud-native security solutions across AWS, Azure, and GCP
+ Define and enforce security policies, IAM roles, and least-privilege access models
+ Lead threat modelling, risk assessments, and vulnerability management initiatives
+ Monitor cloud environments for security anomalies and respond to incidents
+ Automate security controls using Infrastructure-as-Code and CI/CD pipelines
+ Collaborate with compliance teams to support audits and regulatory requirements (e.g., SOC 2, ISO 27001, ISO 9001)
+ Evaluate and integrate third-party security tools and platforms
+ Partner and promote a security-first culture across Cloud engineering teams
**Skills & Requirements** **:**
+ Bachelor's or Master's degree in computer science, Cybersecurity, or related field
+ 3+ years of experience in Cloud Security Engineering or CloudSecOps or DevSecOps roles
+ Deep expertise in AWS, Azure, or GCP security services (e.g., GuardDuty, Security Center, Cloud Armor, etc.)
+ Strong understanding of network security, encryption, identity management, and container security (Kubernetes, Docker)
+ Experience with SIEM tools, vulnerability scanners, and incident response workflows
+ Proficiency in scripting languages (Python, Shell) and Infrastructure-as-Code (Terraform, CloudFormation)
+ Security certifications such as CISSP, CCSP, AWS Security Specialty, or equivalent are a plus
+ End-to-end understanding of how cloud-based web applications work and their architecture
**Apply Now** **:**
If you're ready to take ownership of cloud security at scale and help protect the backbone of intelligent automation, we'd love to hear from you. Apply now and be part of a team that's redefining the future of work-securely.
All unsolicited resumes submitted to any @automationanywhere.com email address, whether submitted by an individual or by an agency, will not be eligible for an agency fee.
**Automation Anywhere is the leader in Agentic Process Automation (APA), transforming how work gets done with AI-powered automation. Its APA system, built on the industry's first Process Reasoning Engine (PRE) and specialized AI agents, combines process discovery, RPA, end-to-end orchestration, document processing, and analytics-all delivered with enterprise-grade security and governance. Guided by its vision to fuel the future of work, Automation Anywhere helps organizations worldwide boost productivity, accelerate growth, and unleash human potential.**
Equal Opportunity Employer Automation Anywhere is an equal opportunity employer - M/F/D/V. We want to have the best available persons in every job. We will not discriminate in our employment practices due to an applicant's race, color, creed, gender, religion, marital status, age, national origin and ancestry, physical or mental disability, medical condition, sex, genetic information, sexual orientation, military and veteran status or any other category protected by law.
This advertiser has chosen not to accept applicants from your region.

Security Operations Center Analyst

MyRemoteTeam Inc

Posted today

Job Viewed

Tap Again To Close

Job Description

This advertiser has chosen not to accept applicants from your region.

Security Operations Center Analyst

Bengaluru, Karnataka Lenovo

Posted today

Job Viewed

Tap Again To Close

Job Description

PFB the JD:


Job Description

Security Operations Centre (SOC) Analyst plays a vital role in Security delivery. As a SOC Analyst Level 3, you will be on the front line of Cyber Defense, detecting & responding to Cyber Incidents as they happen. You will work with other team members to provide situational awareness through detection, containment, and remediation of IT threats. This job requires great attention to detail and general awareness of Cyber Security tools like SIEM, XDR, EDR, IDS/ IPS, ability understand various logs - network logs, sys logs, Firewall logs. As a SOC Analyst you are expected to have working knowledge in areas of networking, malware analysis, incident response, vulnerability management.

* Threat & vulnerability analysis

* Investigate, document & report Information security issues & emerging trends

* Analysis & response to unknown vulnerabilities

Responsibilities

As a SOC Analyst - Level 3, you will:

* Operate as detection and security incident response subject-matter expert

* Technical subject-matter expert in SOC/ SIEM and supporting technologies (EDR, UEBA, etc.) to develop custom queries (e.g., KQL) and playbooks for the SOC analysts to utilize in their investigations.

* Align and maintain detection capability to the Mitre attack framework.

* Perform root cause analysis of detection failures, identify areas for improvement.

* Drive the continuous development of detection capability for SOC

* Manage, investigate, and resolve complex issues with the Security tooling.

* Securely configure the SIEM, and other SOC solutions in accordance with relevant policy and regulation

* Support the Threat hunters in executing complex data analysis.

* Provide a point of escalation for SOC/ security detection technical service issues.

* Ensure the relevant security tools are compliant with company standards and governance.

* Contribute to existing Policy, procedures and process documentation enhancements

* Define and implement technical governance processes for security tooling of SOC, SIEM and other security tools including AV, EDR, Defender Cloud.

* Create and review detection technology high and low level designs.

* Propose and identify automation opportunities resulting from incidents;

* Provide recommendations to the Client team, on how to mitigate or avert the occurrence of any suspicious activity within their environment.

* Provide In depth analysis to the user/customer about the security incidents (eg. Phishing attack)

* Troubleshoot connector/ logger/ Manager for log retrievals

* Prepare SOC Management Reports.

* Analyzing & preparing daily and monthly reports based on the devices which are being monitored

* Creating Reports and Dashboards based on the customer requirement.

* Creating Queries for the Rules requested by client for real time alerts.

* Creating Reports which helps in providing the logs for the alerts, for finding any possible threats.

* Analyze a variety of network and host-based security appliance logs (Firewalls, NIDS, HIDS, Sys Logs, etc.) to determine the correct remediation actions and escalation paths.

* Independently follow procedures to contain, analyze, and eradicate malicious activity.

* Change Management/ Implementation: Independently implement changes to meet customer infrastructure needs within area of technical responsibility

* Patch and Security Management: Apply patch and security changes per policy.

* Configuration Management: Review Configuration Management Database (CMDB) entries to ensure they are complete and accurate.

* Quality: Provide continual improvement recommendations for direct responsibility area (process improvement, technical standard updates, etc).

* Project Management: Lead & participate in customer and internal projects, including transformation.

* Customer Relationship Management: Set expectations with customers and/or internal businesses/end users within defined parameters.

* Teamwork: Work as part of a team, which may be virtual and/or global. Participate as part of a team and maintains good relationships with team members and customers

Skill

8 - 12 years of relevant experience

Typical skills include:

* Fine-tune SIEM and other SOC tooling to exclude noise and false positives

* Create and fine-tune content in SIEM - correlation rules, Dashboard and Reports etc

* Interact with SIEM, EDR and NDR vendors (TAC Support) to remediate any issues with tooling

* Evaluate new solutions for SOC

* Identify opportunities to improve overall capacity, playbook and runbook

* Understanding of threat landscapes and threat modelling, security threat and vulnerability management, and security monitoring

* Working knowledge of tools and techniques used by attackers to gain entry into corporate networks, including common IT system flaws and vulnerabilities.

* Knowledge of industry standards such as ISO 27001, HIPAA, FedRAMP, Cloud Security Alliance, NIST frameworks and risk methodologies

* Demonstrated experience in communicating complex security concepts, both verbally and in writing, to a variety of audiences

* Must take ownership of tasks and demonstrate high degree of autonomy to ensure completion

* Excellent understanding of related technologies (Networking, Operating Systems)

* General Project Management (Expert)

* Customer/Vendor Management (IExpert)

* Business Analysis (Expert)

* Has ability to perform/drive resolution of problems on individual products.

* Able to communicate broad and specific concepts with team and to peers.

* Able to produce documentation for use by team and customer.

* Able to perform/drive resolution of problems on combinations and interactions of products

* Strong verbal & written communication skills

* Proactive approach to meet & exceed goals

Qualification & Experience

Bachelor’s degree in engineering (Electronics, Communication, Computer Science)

8 - 12 years of relevant experience in SOC domain

Strong understanding ITIL process

Recognized Cyber Security certifications, such as CISSP, CISM, SANS, SABSA, OSCP are advantageous.

Microsoft Security and compliance certifications such as SC-200, MS-500 and AZ-500 preferred

This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Security intern Jobs in India !

Lead Security Operations Analyst

Bengaluru, Karnataka Smarsh

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

Smarsh is the leader in communications compliance, archiving, and analytics. We provide compliance across the broadest set of communications channels with insights on what’s being captured. Smarsh customers manage over 500 million daily conversations across 80 channels and growing. Customers include the top 10 U.S., top 8 European, top 5 Canadian, and top 3 Asian banks. The Smarsh advantage is customers stay ahead of compliance and uncover patterns and relationships hidden within their data.


At Smarsh , we’ve been helping our customers manage new forms of communication since 1998. We work closely with regulators including the SEC, FINRA, IIROC, and the PRA and FCA, and with our customers, to ensure that they understand the capabilities of today’s technology and that our platform meets their most stringent requirements. Our products include Connected Capture, Connected Archive, Web Archive & Business Solutions.


About the team:

The Lead Security Operations Analyst - plays a critical role in the Security Operations Center (SOC) by handling escalated incidents from the analysts. This role involves in-depth analysis, incident response coordination, mentoring of analysts, real time security monitoring, threat hunting and ensuring compliance with the Security policies and standards.

Skills and Experience:

  • Experience: 10 plus years of experience in cybersecurity, particularly in security operations.
  • Cybersecurity Expertise: Advanced knowledge of cybersecurity threats, vulnerabilities, malware investigation and incident response, evidence collection, communication and documentation
  • Technical Proficiency: Proficiency in operational support, Security Architecture of SIEM, SOAR, EDR, XDR, Firewalls and other security tools.
  • Analytical Skills: Strong analytical, investigative, and problem-solving skills.
  • Forensic Analysis: Experience with forensic analysis and malware analysis.
  • Certifications: Relevant certifications such as CFCE, CISSP, GCIH, or GCIA.
  • Language Skills: Excellent verbal and writing skills in English.
  • On Call Support: Rotational on call support for high severity incidents in a 24x7 environment.


Roles and Responsibilities

  • Incident Analysis: Conduct detailed analysis of escalated security incidents. Coordination of end-to-end Security Incident management on escalated incidents, ensuring timely updates to stakeholders and efficient resolution of incidents.
  • Incident Response: Lead the development and implementation of incident response plans.
  • Threat Monitoring and Analysis: Monitor security alerts and events using SIEM and other security tools. Lead and coordinate proactive threat hunting to identify potential risks and vulnerabilities. Analyze and integrate threat intelligence feeds to the platforms and stay updated on emerging threats.
  • Mentorship: Mentor and provide guidance to Security analysts on incident handling. Foster a culture of continuous improvement and learning.
  • Forensic Analysis: Perform forensic analysis and malware analysis of Computers, Cloud, Networks, Mobile devices and other digital medias
  • Architecture Design: Develop and refine architecture of Security Tools and platforms
  • Collaboration: Creatively solve problems collaborating with SecOps, Platform, Delivery, IT and Engineering team members.


Qualifications:

  • Education: Bachelor’s degree in computer science, Cybersecurity, or a related field.
  • Certifications: Advanced certifications such as CISSP, OSCP, GCIH, GSOC or GCIA.
  • Incident Response Experience: 7+ years of experience in Cyber Incident response and investigations.
  • Leadership Skills: Strong leadership and communication skills.


Why Smarsh?

Smarsh hires lifelong learners with a passion for innovating with purpose, humility and humor. Collaboration is at the heart of everything we do. We work closely with the most popular communications platforms and the world’s leading cloud infrastructure platforms. We use the latest in AI/ML technology to help our customers break new ground at scale. We are a global organization that values diversity, and we believe that providing opportunities for everyone to be their authentic self is key to our success. Smarsh leadership, culture, and commitment to developing our people have all garnered Comparably.com Best Places to Work Awards. Come join us and find out what the best work of your career looks like

This advertiser has chosen not to accept applicants from your region.

Security Operations Centre Analyst

Bengaluru, Karnataka RingCentral

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

Security Operations Centre Analyst

This is a great opportunity to work at a rapidly growing, market leading Unified Communications as-a-service company. RingCentral provides Voice-over-IP (VoIP), hosted PBX, voicemail, SMS, e-fax, and HD video meeting solutions for business.


About this role:

As a SOC Analyst at RingCentral, your primary responsibilities are to implement a comprehensive security monitoring, incident response and threat intelligence program for RingCentral’s global cloud service, corporate and development environments. You will also be collaboratively providing feedback to improve security operations processes, generating actionable analysis and threat intelligence from tools, logs, and other data sources, ensuring strong documentation is in place to support ongoing SOC activities, and reporting your observations to other Security, Operations and IT personnel.


Successful Candidates will:

  • Have proven skills in application security, security monitoring, incident response and intrusion analysis
  • Have strong knowledge of the diverse methods and technologies used to attack web/mobile/desktop applications, SaaS infrastructure, and data
  • Think critically, work well under pressure, and possess strong analytical, written, verbal, and interpersonal skills
  • Demonstrated track record of quality processes in candidate’s work history
  • Be strongly self-motivated with an aptitude for both individual and team-oriented work
  • Have experience following and refining standard operating procedures and playbooks


Responsibilities:

  • Monitor security events, analyze and investigate alarms, and maintain day-to-day operational activities of a secure cloud environment
  • Engage teams within and outside of RingCentral to mitigate and resolve cases
  • Maintain relevant documentation and audit artifacts
  • Identify and track suspicious system activity
  • Identify trends and patterns, and present them to Security Engineers to enhance our processes and systems
  • This role participates in on-call rotations


Qualifications / Requirements:

  • 2+ years in a security engineering, SRE, or SOC roles in a cloud services environment
  • Experience with SIEM
  • Experience investigating security incidents
  • Basic knowledge AWS or GCP
  • Experience with IDS, case management, and related tools and practices
  • Experience with Linux, RedHat preferred
  • Basic knowledge of broad security topics such as encryption, application security, malware, ransomware, etc.
  • Knowledge of network, VoIP and web related protocols (e.g., TCP/IP, UDP, IPSEC, HTTP, HTTPS, SIP, RTP)


Preferred Skills/Experience:

  • GIAC or CompTIA Sec+ CYSA+, CISCO, Offsec, splunk/redhat certifications.
  • Experience using Crowdstrike, Cloudflare, FirePower, Splunk, ELK, Imperva, Syslog, packet capture, and Windows Event Log tools and similar tools
  • Knowledge of current hacking techniques, malicious code trends, botnets, exploits, malware, DDoS, and data breach events
  • Strong knowledge of Microsoft Windows
This advertiser has chosen not to accept applicants from your region.

Security Operations Center Analyst

Bengaluru, Karnataka Insight Global

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

We are seeking a Security Operations Center (SOC) Analyst with hands-on experience in Secureworks Taegis and Microsoft Defender (Endpoint, Identity, and Cloud) to join our cybersecurity team. This role is critical for monitoring, analyzing, and responding to security threats across cloud and hybrid environments. The ideal candidate will thrive in high-pressure situations, collaborate across teams, and leverage SIEM/SOAR capabilities to enhance threat detection and response.

Key Responsibilities

  • Monitor and triage security alerts using Secureworks Taegis and Microsoft Defender , including detection rule authoring and alert enrichment.
  • Investigate incidents across cloud, network, and endpoint environments using Secureworks case management and Defender telemetry.
  • Develop and maintain log ingestion pipelines using tools like Cribl or Logstash for Secureworks integration.
  • Collaborate with Tier-2/3 analysts and threat intelligence teams to refine detection rules and reduce false positives.
  • Participate in incident response activities , including containment, eradication, and recovery.
  • Create and maintain SOC playbooks and automation workflows using Secureworks SOAR and Microsoft security automation capabilities.
  • Conduct packet analysis, malware triage, and forensic investigations as needed.
  • Stay current on threat landscapes, compliance standards (e.g., MITRE ATT&CK, GDPR, PCI-DSS), and emerging security technologies.

Required Skills

  • 7-10 years of experience in a SOC or cybersecurity operations role.
  • Proficiency with Secureworks Taegis and Microsoft Defender (Endpoint, Identity, Cloud), including rule tuning, log analysis, and case management.
  • Experience with SIEM tools (e.g., Splunk, QRadar, Elastic Stack) and SOAR platforms.
  • Strong understanding of TCP/IP, DNS, HTTP/S , and other network protocols.
  • Familiarity with endpoint detection tools (e.g., Defender for Endpoint), IDS/IPS, and vulnerability scanners (e.g., Nessus, Qualys).
  • Scripting skills in Python, Bash, or PowerShell for automation and data parsing.

Preferred Qualifications

  • Bachelor’s degree in Cybersecurity, Computer Science, or related field.
  • Certifications such as CompTIA Security+ , GIAC (GCIH, GCIA) , CEH , or Microsoft Security certifications (e.g., SC-200, SC-300).
  • Prior experience supporting federal or financial clients .
  • Experience with red/blue/purple team exercises and threat hunting .


  • Seniority Level
  • Mid-Senior level
  • Industry
  • Aviation and Aerospace Component Manufacturing
  • Employment Type
  • Contract
  • Job Functions
  • Information Technology
  • Skills
  • Cybersecurity
  • Cyber-security
  • Triage
  • Analytical Skills
  • Operations
  • Malware Analysis
  • Forensic Analysis
  • Computer Science
  • Security Operations
This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Security Intern Jobs