1,307 Soc Engineer jobs in India

SOC Engineer

Bengaluru, Karnataka Webologix Ltd/ INC

Posted 4 days ago

Job Viewed

Tap Again To Close

Job Description

Job Position: SOC Engineer

Location: PAN.

Experience: 5+ to 10+ Years

Must have: Forensics - Others

Roles Responsibilities

  • Review daily operational activities and timely mentor junior analysts
  • Conduct detailed analysis on escalated events and handover the call to the Incident Response team along with appropriate evidence
  • Ensure 100 incidents validation and closure
  • Manage shifts and facilitate knowledge transfer within shifts shift handover
  • Study attack types and methods while monitoring the environment for threats
  • Perform deep dive incident analysis by correlating data from various sources
  • Document and archive artefacts for future reference
  • Define the criticality of behaviour events based on experience and information security understanding
  • Lead operations and act as a security consultant for incidents and s observed
  • Guide junior analysts in investigations analysis and categorization
  • Monitor various technology dashboards and identify any suspicious activities or anomalies
  • Ensure quality check for all s and incidents raised by L1 analysts
  • Investigate and close testing incidents defining the steps and processes
  • Prepare daily summary reports
  • Raise control related concerns such as SOAR and SIEM
  • Define operations related activities
  • Review IRC SOP and manage all other process documents
  • Submit audit data
  • Escalate to seniors before the TAT breach
  • Handle TAT responsibilities
  • Validate SOC incidents by the Bank L2 team
  • This role requires a proactive approach to security operations ensuring thorough analysis and validation of incidents mentoring junior analysts and maintaining high standards of documentation and reporting
This advertiser has chosen not to accept applicants from your region.

SOC Engineer

Bengaluru, Karnataka Tietoevry

Posted 4 days ago

Job Viewed

Tap Again To Close

Job Description

SOC L2 Engineer

Location - Bangalore/Chandigarh

Experience - 4+ years

Hands-on expertise with either IBM QRadar and/or Microsoft Sentinel SIEM platforms


As this is an immediate need, candidates who can join within 30 days may apply.


About the Role: We are seeking a highly skilled and motivated L2 SOC Engineer with 4-6 years of experience in implementing security solutions, maintenance and troubleshooting. The ideal candidate will have deep hands-on expertise with either IBM QRadar and/or Microsoft Sentinel SIEM platforms. You will play a crucial role in integration, monitoring, and analyzing to security tools/incidents, and contributing to the continuous improvement of our security posture.

Key Responsibilities:

  • SIEM Administration & Optimization:
  • Support the administration, maintenance, and health monitoring of the SIEM platform (QRadar or Microsoft Sentinel).
  • Log source integration and parsing.
  • Assist with log source onboarding, parser development, and data normalization within the SIEM.
  • Contribute to the continuous improvement of SOC processes, playbooks, and standard operating procedures (SOPs).
  • Security Monitoring & Incident Response:
  • Conduct thorough investigations to determine the scope, root cause, and impact of security incidents (e.g., malware infections, phishing attempts, unauthorized access, denial-of-service attacks).
  • Execute incident response procedures, including containment, eradication, and recovery, in accordance with established playbooks and industry best practices (e.g., NIST, MITRE ATT&CK).
  • Document all incident details, analysis findings, and remediation steps accurately and comprehensively in the incident management system.
  • Collaborate with cross-functional teams (IT operations, network, application development) to facilitate incident resolution and implement corrective actions.
  • Participate in on-call rotation as required to ensure 24/7 security coverage.

Required Skills and Qualifications:

  • Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field.
  • 4-6 years of hands-on experience in a Security Operations Center (SOC) environment.
  • Strong expertise with either IBM QRadar and Microsoft Sentinel, including:
  • In-depth knowledge of SIEM components and how it works.
  • Good troubleshooting skills.
  • In-depth knowledge of log source integration troubleshooting.
  • Experience in developing and optimizing correlation rules, use cases, and dashboards.
  • Familiarity with log source integration and data ingestion.
  • (For QRadar): Experience with QRadar AQL (Ariel Query Language) and building blocks.
  • (For Sentinel): Proficiency with KQL (Kusto Query Language) and Azure security services (Azure AD, Azure Security Center, Azure Log Analytics).
  • Strong knowledge of network protocols (TCP/IP, HTTP, DNS, SMTP, etc.) and network security concepts (firewalls, IDS/IPS, VPNs).
  • Proficiency in analyzing logs from various sources (Windows Event Logs, Linux logs, firewall logs, web server logs, cloud logs).
  • Familiarity with scripting languages (e.g., Python, PowerShell) for automation and data analysis is a plus.
  • Excellent analytical, problem-solving, and critical thinking skills.
  • Strong written and verbal communication skills, with the ability to articulate technical issues to both technical and non-technical audiences.
  • Ability to work effectively both independently and as part of a team in a fast-paced environment.

Preferred Certifications (one or more highly desirable):

  • Microsoft Certified: Azure Security Engineer Associate (for Sentinel focus)
  • IBM Certified Analyst - Security QRadar SIEM
This advertiser has chosen not to accept applicants from your region.

SOC Engineer

Bengaluru, Karnataka Tietoevry

Posted today

Job Viewed

Tap Again To Close

Job Description

SOC L2 Engineer

Location - Bangalore/Chandigarh

Experience - 4+ years

Hands-on expertise with either IBM QRadar and/or Microsoft Sentinel SIEM platforms

As this is an immediate need, candidates who can join within 30 days may apply.

About the Role: We are seeking a highly skilled and motivated L2 SOC Engineer with 4-6 years of experience in implementing security solutions, maintenance and troubleshooting. The ideal candidate will have deep hands-on expertise with either IBM QRadar and/or Microsoft Sentinel SIEM platforms. You will play a crucial role in integration, monitoring, and analyzing to security tools/incidents, and contributing to the continuous improvement of our security posture.

Key Responsibilities:

  • SIEM Administration & Optimization:
  • Support the administration, maintenance, and health monitoring of the SIEM platform (QRadar or Microsoft Sentinel).
  • Log source integration and parsing.
  • Assist with log source onboarding, parser development, and data normalization within the SIEM.
  • Contribute to the continuous improvement of SOC processes, playbooks, and standard operating procedures (SOPs).
  • Security Monitoring & Incident Response:
  • Conduct thorough investigations to determine the scope, root cause, and impact of security incidents (e.g., malware infections, phishing attempts, unauthorized access, denial-of-service attacks).
  • Execute incident response procedures, including containment, eradication, and recovery, in accordance with established playbooks and industry best practices (e.g., NIST, MITRE ATT&CK).
  • Document all incident details, analysis findings, and remediation steps accurately and comprehensively in the incident management system.
  • Collaborate with cross-functional teams (IT operations, network, application development) to facilitate incident resolution and implement corrective actions.
  • Participate in on-call rotation as required to ensure 24/7 security coverage.

Required Skills and Qualifications:

  • Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field.
  • 4-6 years of hands-on experience in a Security Operations Center (SOC) environment.
  • Strong expertise with either IBM QRadar and Microsoft Sentinel, including:
  • In-depth knowledge of SIEM components and how it works.
  • Good troubleshooting skills.
  • In-depth knowledge of log source integration troubleshooting.
  • Experience in developing and optimizing correlation rules, use cases, and dashboards.
  • Familiarity with log source integration and data ingestion.
  • (For QRadar): Experience with QRadar AQL (Ariel Query Language) and building blocks.
  • (For Sentinel): Proficiency with KQL (Kusto Query Language) and Azure security services (Azure AD, Azure Security Center, Azure Log Analytics).
  • Strong knowledge of network protocols (TCP/IP, HTTP, DNS, SMTP, etc.) and network security concepts (firewalls, IDS/IPS, VPNs).
  • Proficiency in analyzing logs from various sources (Windows Event Logs, Linux logs, firewall logs, web server logs, cloud logs).
  • Familiarity with scripting languages (e.g., Python, PowerShell) for automation and data analysis is a plus.
  • Excellent analytical, problem-solving, and critical thinking skills.
  • Strong written and verbal communication skills, with the ability to articulate technical issues to both technical and non-technical audiences.
  • Ability to work effectively both independently and as part of a team in a fast-paced environment.

Preferred Certifications (one or more highly desirable):

  • Microsoft Certified: Azure Security Engineer Associate (for Sentinel focus)
  • IBM Certified Analyst - Security QRadar SIEM
This advertiser has chosen not to accept applicants from your region.

SOC Engineer

Bengaluru, Karnataka Webologix Ltd/ INC

Posted today

Job Viewed

Tap Again To Close

Job Description

Job Position: SOC Engineer

Location: PAN.

Experience: 5+ to 10+ Years

Must have: Forensics - Others

Roles Responsibilities

  • Review daily operational activities and timely mentor junior analysts
  • Conduct detailed analysis on escalated events and handover the call to the Incident Response team along with appropriate evidence
  • Ensure 100 incidents validation and closure
  • Manage shifts and facilitate knowledge transfer within shifts shift handover
  • Study attack types and methods while monitoring the environment for threats
  • Perform deep dive incident analysis by correlating data from various sources
  • Document and archive artefacts for future reference
  • Define the criticality of behaviour events based on experience and information security understanding
  • Lead operations and act as a security consultant for incidents and s observed
  • Guide junior analysts in investigations analysis and categorization
  • Monitor various technology dashboards and identify any suspicious activities or anomalies
  • Ensure quality check for all s and incidents raised by L1 analysts
  • Investigate and close testing incidents defining the steps and processes
  • Prepare daily summary reports
  • Raise control related concerns such as SOAR and SIEM
  • Define operations related activities
  • Review IRC SOP and manage all other process documents
  • Submit audit data
  • Escalate to seniors before the TAT breach
  • Handle TAT responsibilities
  • Validate SOC incidents by the Bank L2 team
  • This role requires a proactive approach to security operations ensuring thorough analysis and validation of incidents mentoring junior analysts and maintaining high standards of documentation and reporting
This advertiser has chosen not to accept applicants from your region.

SOC Engineer

Bengaluru, Karnataka Tietoevry

Posted 4 days ago

Job Viewed

Tap Again To Close

Job Description

SOC L2 Engineer
Location - Bangalore/Chandigarh
Experience - 4+ years
Hands-on expertise with either IBM QRadar and/or Microsoft Sentinel SIEM platforms

As this is an immediate need, candidates who can join within 30 days may apply.

About the Role: We are seeking a highly skilled and motivated L2 SOC Engineer with 4-6 years of experience in implementing security solutions, maintenance and troubleshooting. The ideal candidate will have deep hands-on expertise with either IBM QRadar and/or Microsoft Sentinel SIEM platforms. You will play a crucial role in integration, monitoring, and analyzing to security tools/incidents, and contributing to the continuous improvement of our security posture.
Key Responsibilities:
SIEM Administration & Optimization:
Support the administration, maintenance, and health monitoring of the SIEM platform (QRadar or Microsoft Sentinel).
Log source integration and parsing.
Assist with log source onboarding, parser development, and data normalization within the SIEM.
Contribute to the continuous improvement of SOC processes, playbooks, and standard operating procedures (SOPs).
Security Monitoring & Incident Response:
Conduct thorough investigations to determine the scope, root cause, and impact of security incidents (e.g., malware infections, phishing attempts, unauthorized access, denial-of-service attacks).
Execute incident response procedures, including containment, eradication, and recovery, in accordance with established playbooks and industry best practices (e.g., NIST, MITRE ATT&CK).
Document all incident details, analysis findings, and remediation steps accurately and comprehensively in the incident management system.
Collaborate with cross-functional teams (IT operations, network, application development) to facilitate incident resolution and implement corrective actions.
Participate in on-call rotation as required to ensure 24/7 security coverage.
Required Skills and Qualifications:
Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field.
4-6 years of hands-on experience in a Security Operations Center (SOC) environment.
Strong expertise with either IBM QRadar and Microsoft Sentinel, including:
In-depth knowledge of SIEM components and how it works.
Good troubleshooting skills.
In-depth knowledge of log source integration troubleshooting.
Experience in developing and optimizing correlation rules, use cases, and dashboards.
Familiarity with log source integration and data ingestion.
(For QRadar): Experience with QRadar AQL (Ariel Query Language) and building blocks.
(For Sentinel): Proficiency with KQL (Kusto Query Language) and Azure security services (Azure AD, Azure Security Center, Azure Log Analytics).
Strong knowledge of network protocols (TCP/IP, HTTP, DNS, SMTP, etc.) and network security concepts (firewalls, IDS/IPS, VPNs).
Proficiency in analyzing logs from various sources (Windows Event Logs, Linux logs, firewall logs, web server logs, cloud logs).
Familiarity with scripting languages (e.g., Python, PowerShell) for automation and data analysis is a plus.
Excellent analytical, problem-solving, and critical thinking skills.
Strong written and verbal communication skills, with the ability to articulate technical issues to both technical and non-technical audiences.
Ability to work effectively both independently and as part of a team in a fast-paced environment.
Preferred Certifications (one or more highly desirable):
Microsoft Certified: Azure Security Engineer Associate (for Sentinel focus)
IBM Certified Analyst - Security QRadar SIEM
This advertiser has chosen not to accept applicants from your region.

SOC Engineer

Bengaluru, Karnataka Webologix Ltd/ INC

Posted 4 days ago

Job Viewed

Tap Again To Close

Job Description

Job Position: SOC Engineer
Location: PAN.
Experience: 5+ to 10+ Years
Must have: Forensics - Others
Roles Responsibilities
Review daily operational activities and timely mentor junior analysts
Conduct detailed analysis on escalated events and handover the call to the Incident Response team along with appropriate evidence
Ensure 100 incidents validation and closure
Manage shifts and facilitate knowledge transfer within shifts shift handover
Study attack types and methods while monitoring the environment for threats
Perform deep dive incident analysis by correlating data from various sources
Document and archive artefacts for future reference
Define the criticality of behaviour events based on experience and information security understanding
Lead operations and act as a security consultant for incidents and s observed
Guide junior analysts in investigations analysis and categorization
Monitor various technology dashboards and identify any suspicious activities or anomalies
Ensure quality check for all s and incidents raised by L1 analysts
Investigate and close testing incidents defining the steps and processes
Prepare daily summary reports
Raise control related concerns such as SOAR and SIEM
Define operations related activities
Review IRC SOP and manage all other process documents
Submit audit data
Escalate to seniors before the TAT breach
Handle TAT responsibilities
Validate SOC incidents by the Bank L2 team
This role requires a proactive approach to security operations ensuring thorough analysis and validation of incidents mentoring junior analysts and maintaining high standards of documentation and reporting
This advertiser has chosen not to accept applicants from your region.

SOC Engineer

Bengaluru, Karnataka Webologix Ltd/ INC

Posted today

Job Viewed

Tap Again To Close

Job Description

Job Position: SOC Engineer

Location: PAN.

Experience: 5+ to 10+ Years

Must have: Forensics - Others

Roles Responsibilities

  • Review daily operational activities and timely mentor junior analysts
  • Conduct detailed analysis on escalated events and handover the call to the Incident Response team along with appropriate evidence
  • Ensure 100 incidents validation and closure
  • Manage shifts and facilitate knowledge transfer within shifts shift handover
  • Study attack types and methods while monitoring the environment for threats
  • Perform deep dive incident analysis by correlating data from various sources
  • Document and archive artefacts for future reference
  • Define the criticality of behaviour events based on experience and information security understanding
  • Lead operations and act as a security consultant for incidents and s observed
  • Guide junior analysts in investigations analysis and categorization
  • Monitor various technology dashboards and identify any suspicious activities or anomalies
  • Ensure quality check for all s and incidents raised by L1 analysts
  • Investigate and close testing incidents defining the steps and processes
  • Prepare daily summary reports
  • Raise control related concerns such as SOAR and SIEM
  • Define operations related activities
  • Review IRC SOP and manage all other process documents
  • Submit audit data
  • Escalate to seniors before the TAT breach
  • Handle TAT responsibilities
  • Validate SOC incidents by the Bank L2 team
  • This role requires a proactive approach to security operations ensuring thorough analysis and validation of incidents mentoring junior analysts and maintaining high standards of documentation and reporting
This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Soc engineer Jobs in India !

SOC Engineer

Bengaluru, Karnataka Tietoevry

Posted today

Job Viewed

Tap Again To Close

Job Description

SOC L2 Engineer

Location - Bangalore/Chandigarh

Experience - 4+ years

Hands-on expertise with either IBM QRadar and/or Microsoft Sentinel SIEM platforms


As this is an immediate need, candidates who can join within 30 days may apply.


About the Role: We are seeking a highly skilled and motivated L2 SOC Engineer with 4-6 years of experience in implementing security solutions, maintenance and troubleshooting. The ideal candidate will have deep hands-on expertise with either IBM QRadar and/or Microsoft Sentinel SIEM platforms. You will play a crucial role in integration, monitoring, and analyzing to security tools/incidents, and contributing to the continuous improvement of our security posture.

Key Responsibilities:

  • SIEM Administration & Optimization:
  • Support the administration, maintenance, and health monitoring of the SIEM platform (QRadar or Microsoft Sentinel).
  • Log source integration and parsing.
  • Assist with log source onboarding, parser development, and data normalization within the SIEM.
  • Contribute to the continuous improvement of SOC processes, playbooks, and standard operating procedures (SOPs).
  • Security Monitoring & Incident Response:
  • Conduct thorough investigations to determine the scope, root cause, and impact of security incidents (e.g., malware infections, phishing attempts, unauthorized access, denial-of-service attacks).
  • Execute incident response procedures, including containment, eradication, and recovery, in accordance with established playbooks and industry best practices (e.g., NIST, MITRE ATT&CK).
  • Document all incident details, analysis findings, and remediation steps accurately and comprehensively in the incident management system.
  • Collaborate with cross-functional teams (IT operations, network, application development) to facilitate incident resolution and implement corrective actions.
  • Participate in on-call rotation as required to ensure 24/7 security coverage.

Required Skills and Qualifications:

  • Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field.
  • 4-6 years of hands-on experience in a Security Operations Center (SOC) environment.
  • Strong expertise with either IBM QRadar and Microsoft Sentinel, including:
  • In-depth knowledge of SIEM components and how it works.
  • Good troubleshooting skills.
  • In-depth knowledge of log source integration troubleshooting.
  • Experience in developing and optimizing correlation rules, use cases, and dashboards.
  • Familiarity with log source integration and data ingestion.
  • (For QRadar): Experience with QRadar AQL (Ariel Query Language) and building blocks.
  • (For Sentinel): Proficiency with KQL (Kusto Query Language) and Azure security services (Azure AD, Azure Security Center, Azure Log Analytics).
  • Strong knowledge of network protocols (TCP/IP, HTTP, DNS, SMTP, etc.) and network security concepts (firewalls, IDS/IPS, VPNs).
  • Proficiency in analyzing logs from various sources (Windows Event Logs, Linux logs, firewall logs, web server logs, cloud logs).
  • Familiarity with scripting languages (e.g., Python, PowerShell) for automation and data analysis is a plus.
  • Excellent analytical, problem-solving, and critical thinking skills.
  • Strong written and verbal communication skills, with the ability to articulate technical issues to both technical and non-technical audiences.
  • Ability to work effectively both independently and as part of a team in a fast-paced environment.

Preferred Certifications (one or more highly desirable):

  • Microsoft Certified: Azure Security Engineer Associate (for Sentinel focus)
  • IBM Certified Analyst - Security QRadar SIEM
This advertiser has chosen not to accept applicants from your region.

Soc Engineer

Bengaluru, Karnataka Confidential

Posted today

Job Viewed

Tap Again To Close

Job Description

Roles and Responsibilities:

1) Sound knowledge on Linux, preferably with Red Hat Certification (RHCE) with detailed log analysis expertise.

2) An overall understanding of the following, with expertise in either domain

a. Clustering

b. Application Servers (Java/Tomcat)

c. Database Storage d. Network (SSL, DNS, HTTP, TCP/IP, Load Balancing concepts)

3) Self-Starter who is comfortable working as part of a globally distributed team

4) Attention to detail and ability to develop and perform standard operating procedures is a must

  • 5) Must be willing to work in various shifts in a 24/7 environment as needed, and flexible to assist in shift coverage

Skills Required
San, Linux, Networking, Weblogic
This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Soc Engineer Jobs