2,013 Security Operations jobs in India
Security Operations Center Analyst
Posted today
Job Viewed
Job Description
Job Profile: Sr. SOC Analyst – Cyber Defence Center
- Location: Navi Mumbai
- Shifts: 24x7 Rotation
- Experience: 4–8 Years
- Notice Period: Immediate Joiner
- Industry: Information Technology | BFSI | Fintech
- Education: Degree in Computer Science, IT, or EXTC
About the Role
We are looking for a seasoned Senior SOC Analyst to join our Cyber Defence Center. This is a critical role responsible for real-time threat monitoring, incident response, and the overall protection of our IT environment. If you're experienced in SIEM platforms like QRadar or ArcSight and thrive in a fast-paced, 24x7 security operations environment, we want to hear from you!
Key Responsibilities
- Administer and troubleshoot SIEM platforms (ArcSight / IBM QRadar)
- Monitor and analyze alerts from IDPS, antivirus, EDR, firewalls, and other security tools
- Perform incident detection, analysis, response, and reporting
- Manage threat intelligence feeds and perform adversary analysis
- Develop and enhance SOC detection use cases and reduce false positives
- Maintain SOPs, runbooks, and SOAR playbooks
- Collaborate with internal and external teams to resolve technical issues
- Support change and service requests, handle incident escalations
- Lead and contribute to cyber defense projects and continuous improvement initiatives
What You’ll Need
- 4–8 years of hands-on experience in SOC operations
- Strong understanding of SIEM tools (QRadar, ArcSight), threat detection, and incident response
- Experience in endpoint protection, proxy, IDPS, and anomaly detection systems
- Willingness to work in a 24x7 environment
Preferred Certifications (Nice to Have)
- CEH, CTIA, CISM, CCNA, or Certified Network Defender (EC-Council)
Security Operations Center Analyst
Posted 1 day ago
Job Viewed
Job Description
Start Date : Mid August
Location : Remote anywhere in India
Interview process : a 30 minute video
A Senior Associate will hold the following roles and responsibilities as part of their role:
- Demonstrate proficiency in Schellman Methodology
- Guide associates and peers
- Obtain certifications (ISO LA, CISA, CISSP, AWS CCP, etc.)
- Successfully run a project from fieldwork through completion
- Understand and demonstrate ability to speak to Schellman's service lines at a high level and their leaders
- Demonstrate proficiency of SOC 1 GITCs and each Security, Availability, Processing Integrity, Confidentiality, and Privacy SOC 2 criteria
- Demonstrate understanding of Principal Service Commitments and System Requirements and how they impact scope of a SOC 2
- Know all four report opinion outcomes and ability to draft modified opinions
- Demonstrate ability to identify if exception(s) would potentially yield a qualified opinion
- Demonstrate self-organization, consistently and proactively look ahead to future projects, and prepare accordingly
- Schellman Methodology
- Read STMV quarterly, and demonstrate ability to apply concepts (sampling methodology, TA language structure, exception wording, etc.)
- Review and demonstrate ability to apply concepts of AS 2.0 Reference Guide
- Review and demonstrate ability to apply concepts of “EWP WP Guidance”
- Obtain CCSK and begin pursuing second certification (ISO 27001 LA, CISA, AWS CCP)
- Understand and demonstrate ability to articulate differences between SOC 1 and SOC 2
- Participate on project as a shadow or assessor for attestation offerings such as HIPAA, AUP, C5, etc.
- Begin understanding SOC 1 GITCs and each SOC 2 criteria for the Security, Availability, and Confidentiality categories
- Ability to articulate qualified vs unqualified opinion; know all four types of opinions
- Learn Schellman's services and service line leaders
- Adhere to and complete all matters included in the Associate Score Card
- Accurately manage and report time worked to each project / initiative
Knowledge, Skills, and Abilities:
- Working knowledge of Schellman’s services, methodology, and relevant professional standards
- Requisite knowledge of applicable technology and security domains
- High level of attention to detail and quality of work product
- Client service oriented
- Excellent time management, organizational, and verbal and written communication skills
- Ability to work on-site or remotely as a valuable contributor to a collaborative team
- Capable of simultaneously managing assigned tasks for multiple projects
- Proficient using Microsoft Word, Excel, and PowerPoint, as well as Schellman’s service delivery applications
- Full understanding and application of ethics, independence and Schellman’s values
Education, Work Experience and Certifications
- Bachelor's degree in accounting, finance, business management, technology, or other relevant subject area, or equivalent years of experience directly related to the duties and responsibilities specified
- 2+ years of related professional services experience in information security auditing, assessment, consulting or compliance, focused on ITGC or SOC controls
- Ability to work well independently, within a team and with clients as well as travel ~40-50% (M-Th)
- Maintains (preferred) or working towards obtaining least one certification relevant to Schellman's services (i.e. CPA, CCSK or CISA)
Security Operations Center Analyst
Posted 1 day ago
Job Viewed
Job Description
Key Responsibilities: Level 3 SOC Analyst
Incident Response and Investigation:
Act as the primary escalation point for Level 2 SOC analysts.
Investigate and respond to complex security incidents, ensuring rapid containment, mitigation, and recovery.
Conduct root cause analysis and post-incident reviews.
Threat Detection and Analysis:
Develop advanced detection rules, use cases, and alerts in SIEM and other security tools.
Perform in-depth analysis of malware, phishing campaigns, and other advanced threats.
Utilize threat intelligence to identify and anticipate new threats.
Tool and System Management:
Fine-tune and optimize security tools such as SIEM, IDS/IPS, EDR, and firewalls.
Conduct regular audits and recommend improvements to security systems and processes.
Lead the integration of new technologies into the SOC.
Mentoring and Leadership:
Provide guidance and training to Level 1 and Level 2 SOC analysts.
Lead incident response drills and tabletop exercises.
Contribute to the development of SOC processes, playbooks, and documentation.
Collaboration and Reporting:
Work with cross-functional teams to ensure alignment with security policies and best practices.
Create and deliver detailed reports and executive summaries on security incidents and trends.
Act as a liaison with external stakeholders, including partners and threat intelligence organizations.
Qualifications and Skills:
Essential:
- Bachelor’s degree in Computer Science, Information Security, or a related field, or equivalent experience.
- 5+ years of experience in cybersecurity, with at least 2 years in a SOC environment.
- Proficiency with SIEM tools (CrowdStrike, Google SecOps) and EDR solutions (Carbon Black, CrowdStrike)
- Strong knowledge of network protocols, operating systems, and attack methodologies.
- Experience in malware analysis, forensic investigation, and threat hunting.
- Advanced certifications such as CISSP, GCIH, GCIA, or CEH.
Desirable:
- Experience with cloud security (AWS, Azure, OCI or Google Cloud).
- Knowledge of scripting languages (Python, PowerShell, etc.).
- Familiarity with compliance frameworks (ISO 27001, NIST, GDPR, etc.).
- Strong communication and documentation skills.
Regards
Shyam J
Senior HR Analyst
106-109, Anna Salai, Guindy, Chennai – 600032
M: +91
Security Operations Center Analyst
Posted 1 day ago
Job Viewed
Job Description
Position Summary:
The SOC Engineering and Operational Lead Engineer is responsible for the engineering and administration activities of SOC tools, such as SIEM, SOAR, and deception technology. Continuously focus on enabling Automations to Support SOC Tools Administrations & Security Incident Detections and response activities.
Roles & Responsibilities:
- Daily Operational management of SOC Tools. (Including SIEM, SOAR.etc Components Infra Maintenance).
- Log, Alert & Enrichment sources integrations with SOC Tools.
- Co-ordinate with different stakeholders to understand the Integration sources to ensure appropriate baseline created and maintained as per industry standards.
- Ensure appropriate correlation rules are in place against the log source types for threat/anomaly detections.
- Ensure proper Incident types, fields, playbooks are defined for Automations in SOAR.
- Continuous touch base with Incident Detection and Response team to fine tune the rules with adequate threshold based on their feedback.
- Evaluate New SOAR/SIEM/Log analytics/big data forensic technologies products to maintain our tools base per industry standard and Olam requirements. (including Open source)
- Interface with stakeholders in different parts of the globe to ensure systems are deployed to the appropriate configuration.
- Develop metrics dashboard to identify trends, anomalies, and opportunities for improvement.
- Ensure adequate change management and documents maintained for SIEM related Changes.
- Periodical review of SOC Tools Architecture, Log Baseline, Rules, Assets health, Automations, Playbooks.etc.
- Ensure high quality of Industry standards and brand consistency in all IT projects.
- Ensure to work with technology stakeholders to enable the deception decoys.
Profile Description:
- Must have 4+ years of experience in Splunk On Prem & Cloud SIEM Engineering and Administration.
- Should have hands on experience in Implementation, configuration, and management of SIEM & SOAR technologies. (Prefer Splunk, Elk, Qradar,Securonix, Demisto, google secops, servicenow secops)
- Should have hands on experience in creating custom correlation rules/alerts, searches, and data analytics in Splunk or similar Log analytics tool.
- Should have hands on experience in creating custom playbooks, automation scripts in SOAR.
- Must have strong working knowledge of Linux-flavored OS environments.
- Strong knowledge in Broad infrastructure and technology background including demonstrable understanding of security operations in critical environment.
- Have sound analytical and problem-solving skills.
- Should have some experience with cloud infrastructure like Microsoft Azure, AWS & GCP.
- Prefer Splunk or Similar log analytics certified Professional.
- Must have strong scripting & Programming language knowledge. (Python,Powershell Vbscript,cc++,.net.etc)
We are Mindsprint!
A leading-edge technology and business services firm that provides impact driven solutions to businesses, enabling them to outpace speed of change. For over three decades we have been accelerating technology transformation for the Olam Group and their large base of global clients.
Working with leading technologies and empowered with the freedom to create new solutions and better existing ones, we have been inspiring businesses with pioneering initiatives.
Awards bagged in the recent years:
- Best Shared Services in India Award by Shared Services Forum – 2019
- Asia’s No.1 Shared Services in Process Improvement and Value Creation by Shared Services and Outsourcing Network Forum – 2019
- International Innovation Award for Best Services and Solutions – 2019
- Kincentric Best Employer India – 2020
- Creative Talent Management Impact Award – SSON Impact Awards 2021
- The Economic Times Best Workplaces for Women – 2021 & 2022
- #SSFExcellenceAward for Delivering Business Impact through Innovative People Practices – 2022
For more info:
Follow us in LinkedIn: Mindsprint
Security Operations Center Analyst
Posted 1 day ago
Job Viewed
Job Description
AML RightSource is a leading provider of anti-money laundering (AML) and financial crimes compliance solutions. Our team of experts provides our clients with the highest quality of service, while ensuring compliance with regulatory requirements. We are currently seeking a Senior SOC Analyst to join our team.
Responsibilities:
• Monitor and analyze security events from multiple sources, including security
information and event management (SIEM) systems, network and host-based intrusion
detection/prevention systems, and other security technologies.
• Conduct investigations into security incidents, analyze evidence, and report findings to
management.
• Provide technical guidance and support to junior SOC analysts.
• Develop and maintain standard operating procedures for the SOC.
• Participate in security assessments and penetration testing activities.
• Conduct threat hunting activities to identify and respond to advanced persistent threats
(APTs).
• Participate in incident response activities and coordinate with other teams to contain
and remediate security incidents.
• Maintain awareness of new and emerging security threats, vulnerabilities, and
mitigation techniques.
• Collaborate with other teams, including the IT team, to ensure the security of the
organization's infrastructure and systems.
• Provide regular reports to management on the SOC's performance and effectiveness.
Requirements :
• Bachelor's degree in computer science, Information Systems, or related field.
• Minimum of 2.5 years of experience in a SOC or security operations role.
• Strong knowledge of security technologies, including SIEM systems, intrusion detection/prevention systems, and other security tools.
• Familiarity with security standards and frameworks, such as NIST, ISO, and SOC 2.
• Experience with security incident response, including investigation, containment, and
remediation.
• Excellent analytical and problem-solving skills.
• Ability to work well in a team environment.
• Strong verbal and written communication skills.
• Relevant security certifications, such as CISSP, CISM, or GSEC, are highly desirable.
Security Operations Center Analyst
Posted 1 day ago
Job Viewed
Job Description
Hi Everyone,
I am on lookout for Sr Information Security Analyst -GSOC for leading product based MNC in Pune, Yerwada.
Kindly refer below JD & share your resume on
Job description:
● 7 to 10 years of overall experience
● Experience with Security Information and Event Management (SIEM) systems (e.g., Splunk, ArcSight, Qradar) and GSOC
● Experience with vulnerability assessment tools and techniques.
● Experience with incident response frameworks and procedures.
● Knowledge of security standards and regulations (e.g., PCI DSS, GDPR)
● Looking for candidates who can join within 30 days
Security Operations Center Analyst
Posted today
Job Viewed
Job Description
Incident Response and Investigation:
Act as the primary escalation point for Level 2 SOC analysts.
Investigate and respond to complex security incidents, ensuring rapid containment, mitigation, and recovery.
Conduct root cause analysis and post-incident reviews.
Threat Detection and Analysis:
Develop advanced detection rules, use cases, and alerts in SIEM and other security tools.
Perform in-depth analysis of malware, phishing campaigns, and other advanced threats.
Utilize threat intelligence to identify and anticipate new threats.
Tool and System Management:
Fine-tune and optimize security tools such as SIEM, IDS/IPS, EDR, and firewalls.
Conduct regular audits and recommend improvements to security systems and processes.
Lead the integration of new technologies into the SOC.
Mentoring and Leadership:
Provide guidance and training to Level 1 and Level 2 SOC analysts.
Lead incident response drills and tabletop exercises.
Contribute to the development of SOC processes, playbooks, and documentation.
Collaboration and Reporting:
Work with cross-functional teams to ensure alignment with security policies and best practices.
Create and deliver detailed reports and executive summaries on security incidents and trends.
Act as a liaison with external stakeholders, including partners and threat intelligence organizations.
Qualifications and Skills:
Essential:
- Bachelor’s degree in Computer Science, Information Security, or a related field, or equivalent experience.
- 5+ years of experience in cybersecurity, with at least 2 years in a SOC environment.
- Proficiency with SIEM tools (CrowdStrike, Google SecOps) and EDR solutions (Carbon Black, CrowdStrike)
- Strong knowledge of network protocols, operating systems, and attack methodologies.
- Experience in malware analysis, forensic investigation, and threat hunting.
- Advanced certifications such as CISSP, GCIH, GCIA, or CEH.
Desirable:
- Experience with cloud security (AWS, Azure, OCI or Google Cloud).
- Knowledge of scripting languages (Python, PowerShell, etc.).
- Familiarity with compliance frameworks (ISO 27001, NIST, GDPR, etc.).
- Strong communication and documentation skills.
Regards
Shyam J
Senior HR Analyst
106-109, Anna Salai, Guindy, Chennai – 600032
M: +91
exelatech.com • About EXELA • Instagram • LinkedIn
Be The First To Know
About the latest Security operations Jobs in India !