1,111 Soc Analyst jobs in India
SOC Analyst/Incident Response
Posted today
Job Viewed
Job Description
• EDR: Crowdstrike or Carbon Black
• Scripting or basic programming (Java, HTML, Powershell, bash)
• Entry-level certifications or higher
SOC Analyst
Posted today
Job Viewed
Job Description
Job Title: SOC Analyst
Experience Required: 5+ Years
Location: Hyderabad
Shift: Rotational Shifts
Notice Period: Immediate Joiners Only
Cab Facility: Available
Job Summary:
We are seeking a skilled and proactive SOC Analyst to join our Security Operations Center in Hyderabad. The ideal candidate will be responsible for monitoring and responding to cybersecurity threats, maintaining and enhancing security systems, and mentoring junior analysts. This is a full-time, office-based role requiring rotational shifts, with cab support provided.
Key Responsibilities:
- Monitor, analyze, and interpret security/system logs to detect operational irregularities and potential incidents.
- Conduct real-time monitoring, detection, and analysis through tools like SIEM, IDS/IPS, EDR, and Firewalls.
- Execute basic red team activities to evaluate existing security controls.
- Support incident response efforts through malware, host, and log analysis.
- Customize and improve security technologies, use cases, and configurations based on evolving threats.
- Monitor external threat/vulnerability intelligence and apply relevant protections.
- Tune and maintain SIEM tools for better efficiency and coverage.
- Monitor cloud environments for potential security breaches or anomalies.
- Deliver timely scheduled and on-demand reports on incidents and system posture.
- Work through the complete lifecycle of security alerts — from detection to remediation.
- Generate shift handover reports and maintain documentation.
- Coach and mentor L1 analysts and assist in their technical development.
- Develop and maintain Standard Operating Procedures (SOPs) and training materials.
- Conduct threat intelligence research and stay updated with the latest attack patterns and security trends.
Required Qualifications & Skills:
Educational Qualification:
- Bachelor’s degree in engineering or related technical disciplines.
Certifications (Preferred):
- CISSP, CEH, CISM, GCIH, GCIA.
Technical Experience:
- 5+ years of hands-on experience in SOC or a related cybersecurity role.
- Proficiency with SIEM tools (Splunk, IBM QRadar, Securonix).
- Experience with Case Management tools (Swimlane, Phantom, etc.).
- Hands-on with EDR solutions like CrowdStrike, SentinelOne, VMware, McAfee, or Microsoft Defender ATP.
- Network traffic analysis tools like Darktrace, FireEye, NetWitness, or Panorama.
- Strong TCP/IP protocol knowledge and ability to interpret event logs.
- Deep understanding of Windows, Linux, and cloud infrastructure security.
- Familiarity with tools like Wireshark, tcpdump, and other packet analyzers.
- Knowledge of ITIL practices and TAT-based incident resolution.
- Scripting/programming knowledge in Python, Perl, or similar languages.
- Exposure to malware analysis or reverse engineering (preferred).
Desired Competencies:
- Clear understanding of SOC roles across L1, L2, and L3.
- Capability to independently lead incident investigations.
- Strong documentation and reporting skills.
- Self-motivated and eager to keep up with cybersecurity trends and innovations.
- Effective communication and team collaboration skills.
SOC Analyst
Posted today
Job Viewed
Job Description
Make an impact with NTT DATA
Join a company that is pushing the boundaries of what is possible. We are renowned for our technical excellence and leading innovations, and for making a difference to our clients and society. Our workplace embraces diversity and inclusion – it's a place where you can grow, belong and thrive.
Your day at NTT DATA
The Security Managed Services Engineer (L2) is a developing engineering role, responsible for providing a managed service to clients to ensure that their Security Infrastructures and systems remain operational.
Through the proactive monitoring, identifying, investigating, and resolving of technical incidents and problems, this role is able to restore service to clients.
The primary objective of this role is to proactively review client requests or tickets and apply technical/process knowledge to resolve them without breaching service level agreement (SLA) and focuses on second-line support for incidents and requests with a medium level of complexity.
The Security Managed Services Engineer (L2) may also contribute to / support on project work as and when required.What you'll be doing
Key Responsibilities:
- Proactively monitors the work queues.
- Performs operational tasks to resolve all incidents/requests in a timely manner and within the agreed SLA.
- Updates tickets with resolution tasks performed.
- Identifies, investigates, analyses issues and errors prior to or when they occur, and logs all such incidents in a timely manner.
- Captures all required and relevant information for immediate resolution.
- Provides second level support to all incidents, requests and identifies the root cause of incidents and problems.
- Communicates with other teams and clients for extending support.
- Executes changes with clear identification of risks and mitigation plans to be captured into the change record.
- Follows the shift handover process highlighting any key tickets to be focused on along with a handover of upcoming critical tasks to be carried out in the next shift.
- Escalates all tickets to seek the right focus from CoE and other teams, if needed continue the escalations to management.
- Works with automation teams for effort optimization and automating routine tasks.
- Ability to work across various other resolver group (internal and external) like Service Provider, TAC, etc.
- Identifies problems and errors before they impact a client's service.
- Provides Assistance to L1 Security Engineers for better initial triage or troubleshooting.
- Leads and manages all initial client escalation for operational issues.
- Contributes to the change management process by logging all change requests with complete details for standard and non-standard including patching and any other changes to Configuration Items.
- Ensures all changes are carried out with proper change approvals.
- Plans and executes approved maintenance activities.
- Audits and analyses incident and request tickets for quality and recommends improvements with updates to knowledge articles.
- Produces trend analysis reports for identifying tasks for automation, leading to a reduction in tickets and optimization of effort.
- May also contribute to / support on project work as and when required.
- May work on implementing and delivering Disaster Recovery functions and tests.
- Performs any other related task as required.
Knowledge and Attributes:
- Ability to communicate and work across different cultures and social groups.
- Ability to plan activities and projects well in advance, and takes into account possible changing circumstances.
- Ability to maintain a positive outlook at work.
- Ability to work well in a pressurized environment.
- Ability to work hard and put in longer hours when it is necessary.
- Ability to apply active listening techniques such as paraphrasing the message to confirm understanding, probing for further relevant information, and refraining from interrupting.
- Ability to adapt to changing circumstances.
- Ability to place clients at the forefront of all interactions, understanding their requirements, and creating a positive client experience throughout the total client journey.
Academic Qualifications and Certifications:
- Bachelor's degree or equivalent qualification in IT/Computing (or demonstrated equivalent work experience).
- Certifications relevant to services supported. Certifications carry additional weightage on the candidate's qualification for the role.
- CCNA certification in must, CCNP in Security or PCNSE certification is good to have.
Required Experience:
- Moderate level of relevant managed services experience handling Security Infrastructure.
- Moderate level of knowledge in ticketing tools preferably Service Now.
- Moderate level of working knowledge of ITIL processes.
- Moderate level of experience working with vendors and/or 3rd parties.
Workplace type:
On-site Working
Skills Required
network forensics, endpoint protection , Security Protocols
SOC Analyst
Posted today
Job Viewed
Job Description
As a SOC Analyst, you will play a crucial role in our security operations. Along the way, you will get to:
- Incident Analysis: Analyze security notifications to identify potential security issues and thoroughly evaluate their impact and severity.
- Incident Response: Oversee the response to verified security incidents, including implementing containment measures and conducting in-depth investigations.
- Threat and Vulnerability Analysis: Investigate, document, and report on information security issues and emerging trends to keep our defenses strong.
- Adjust Security Tools and Processes: Fine-tune security tools and processes to continuously improve the organization's overall security posture.
- Technical Proficiency: In-depth knowledge of security protocols, techniques, and technologies is essential.
- Analytical Skills: Strong ability to analyze system performance and troubleshoot complex security issues.
- Communication: Effective communication skills to seamlessly interact with team members and various stakeholders.
We're legendary for taking care of our teammates, their families, and helping them engage with their local communities. We want you to enjoy a full, meaningful life and own your career at Insight. Some of our benefits include:
- Freedom to work from another location—even an international destination—for up to 30 consecutive calendar days per year.
- Medical Insurance
- Health Benefits
- Professional Development: Access to a comprehensive Learning Platform and Certificate Reimbursement.
- Shift Allowance
Skills Required
Incident Analysis, Security Protocols, Troubleshoot, Communication Skills, Security Technologies, Analytical Skills
SOC Analyst
Posted today
Job Viewed
Job Description
As a SOC Analyst, you will play a crucial role in our security operations. Along the way, you will get to:
- Incident Analysis: Analyze security notifications to identify potential security issues and thoroughly evaluate their impact and severity.
- Incident Response: Oversee the response to verified security incidents, including implementing containment measures and conducting in-depth investigations.
- Threat and Vulnerability Analysis: Investigate, document, and report on information security issues and emerging trends to keep our defenses strong.
- Adjust Security Tools and Processes: Fine-tune security tools and processes to continuously improve the organization's overall security posture.
- Technical Proficiency: In-depth knowledge of security protocols, techniques, and technologies is essential.
- Analytical Skills: Strong ability to analyze system performance and troubleshoot complex security issues.
- Communication: Effective communication skills to seamlessly interact with team members and various stakeholders.
We're legendary for taking care of our teammates, their families, and helping them engage with their local communities. We want you to enjoy a full, meaningful life and own your career at Insight. Some of our benefits include:
- Freedom to work from another location—even an international destination—for up to 30 consecutive calendar days per year.
- Medical Insurance
- Health Benefits
- Professional Development: Access to a comprehensive Learning Platform and Certificate Reimbursement.
- Shift Allowance
Skills Required
Incident Analysis, Security Protocols, Troubleshoot, Communication Skills, Security Technologies, Analytical Skills
SOC Analyst
Posted today
Job Viewed
Job Description
Job Description:
AML RightSource is a leading provider of anti-money laundering (AML) and financial crimes
compliance solutions. Our team of experts provides our clients with the highest quality of
service, while ensuring compliance with regulatory requirements. We are currently seeking a
Senior SOC Analyst to join our team.
Responsibilities:
- Monitor and analyze security events from multiple sources, including security
detection/prevention systems, and other security technologies.
- Conduct investigations into security incidents, analyze evidence, and report findings to
- Provide technical guidance and support to junior SOC analysts.
- Develop and maintain standard operating procedures for the SOC.
- Participate in security assessments and penetration testing activities.
- Conduct threat hunting activities to identify and respond to advanced persistent threats
- Participate in incident response activities and coordinate with other teams to contain
- Maintain awareness of new and emerging security threats, vulnerabilities, and
- Collaborate with other teams, including the IT team, to ensure the security of the
- Provide regular reports to management on the SOC&aposs performance and effectiveness.
- Bachelor&aposs degree in Computer Science, Information Systems, or related field.
- Minimum of 2.5 years of experience in a SOC or security operations role.
- Strong knowledge of security technologies, including SIEM systems, intrusion
- Familiarity with security standards and frameworks, such as NIST, ISO, and SOC 2.
- Experience with security incident response, including investigation, containment, and
- Excellent analytical and problem-solving skills.
- Ability to work well in a team environment.
- Strong verbal and written communication skills.
- Relevant security certifications, such as CISSP, CISM, or GSEC, are highly desirable.
Skills Required
security tools , Threat Hunting, security incident response
SOC Analyst
Posted today
Job Viewed
Job Description
Job Description
Make an impact with NTT DATA
Join a company that is pushing the boundaries of what is possible. We are renowned for our technical excellence and leading innovations, and for making a difference to our clients and society. Our workplace embraces diversity and inclusion – it’s a place where you can grow, belong and thrive.
Your day at NTT DATA
The Security Managed Services Engineer (L2) is a developing engineering role, responsible for providing a managed service to clients to ensure that their Security Infrastructures and systems remain operational.Through the proactive monitoring, identifying, investigating, and resolving of technical incidents and problems, this role is able to restore service to clients.
The primary objective of this role is to proactively review client requests or tickets and apply technical/process knowledge to resolve them without breaching service level agreement (SLA) and focuses on second-line support for incidents and requests with a medium level of complexity.
The Security Managed Services Engineer (L2) may also contribute to / support on project work as and when required.
What you'll be doing
Key Responsibilities:
Knowledge and Attributes:
Academic Qualifications and Certifications:
Required Experience:
Workplace type:
On-site WorkingAbout NTT DATA
NTT DATA is a $30+ billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long-term success. We invest over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure, and connectivity. We are also one of the leading providers of digital and AI infrastructure in the world. NTT DATA is part of NTT Group and headquartered in Tokyo.
Equal Opportunity Employer
NTT DATA is proud to be an Equal Opportunity Employer with a global culture that embraces diversity. We are committed to providing an environment free of unfair discrimination and harassment. We do not discriminate based on age, race, colour, gender, sexual orientation, religion, nationality, disability, pregnancy, marital status, veteran status, or any other protected category. Join our growing global team and accelerate your career with us. Apply today.
Be The First To Know
About the latest Soc analyst Jobs in India !
SOC Analyst
Posted today
Job Viewed
Job Description
Job Title: SOC Analyst
Experience: 4 to 5 Years
Location: Office
Job Type: Full-Time
Job Summary:
We are seeking a skilled and experienced SOC Analyst to join our Security Operations Center. The ideal candidate will have 4–5 years of hands-on experience in security monitoring, threat detection, and incident response. You will play a critical role in identifying and mitigating cyber threats to safeguard our IT infrastructure.
Key Responsibilities:
- Monitor security events and alerts using SIEM tools (e.g., Splunk, QRadar, LogRhythm).
- Perform real-time analysis and triage of security incidents and escalate as needed.
- Conduct initial investigations on potential security threats and anomalies.
- Manage incident response activities including containment, eradication, and recovery.
- Document and maintain incident reports, security logs, and response actions.
- Collaborate with IT, network, and infrastructure teams to ensure secure operations.
- Participate in threat hunting activities to proactively identify risks and vulnerabilities.
- Develop and maintain standard operating procedures (SOPs) for SOC activities.
- Stay updated with the latest cybersecurity trends, vulnerabilities, and threat actors.
- Support compliance audits and risk assessments as needed.
Required Skills & Qualifications:
- Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or related field.
- 4 to 5 years of experience working in a SOC environment.
- Proficiency with SIEM, EDR, IDS/IPS, and log analysis tools.
- Strong understanding of network protocols, firewalls, and endpoint security.
- Familiarity with MITRE ATT&CK framework and threat intelligence platforms.
- Experience with incident response and digital forensics processes.
- Knowledge of cloud security monitoring (AWS, Azure, or GCP).
- Strong analytical and problem-solving skills.
- Certifications preferred: CEH, CompTIA Security+, CySA+, GCIA, or SSCP .
- Scripting skills (Python, PowerShell) for automation and analysis.
- Experience with SOAR platforms and playbook development.
- Knowledge of regulatory standards (e.g., GDPR, HIPAA, ISO 27001, PCI-DSS).
Soft Skills:
- Strong communication skills (written and verbal).
- Ability to work under pressure and handle multiple incidents simultaneously.
- Detail-oriented with a proactive security mindset.
- Collaborative and team-oriented approach.
Skills Required
Gdpr, Hipaa, Ips, Siem Tools, Firewalls, Incident Response, Iso 27001, EDR, Ids, Python, Qradar, Aws, Endpoint Security, Powershell, regulatory standards , Network Protocols, logrhythm , Gcp, Splunk, Azure