drjobs SOC Analyst

SOC Analyst

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Job Location drjobs

Bengaluru - India

Monthly Salary drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Vacancy

1 Vacancy

Job Description

Description

Job Title: SOC Analyst

Reports to: SOC Manager Client Programme

Engagement Model: Client-dedicated 16x7

Role Overview

As a SOC Analyst supporting one of our client engagements you will be responsible for monitoring analysing and resolving security-related tickets as part of a dedicated 16x5 Security Operations Centre. This role is critical to ensuring timely triage and resolution of incidents maintaining compliance with our clients security standards and supporting continuous improvement of detection and response capabilities.

Key Responsibilities

  • Ticket Analysis & Resolution: Review investigate and resolve security tickets raised through our clients monitoring systems and service desk workflows.

  • Alert Triage: Prioritise and categorise alerts based on severity impact and relevance to our clients threat landscape.

  • Incident Documentation: Maintain accurate and detailed records of investigations actions taken and resolution outcomes in our clients ticketing system.

  • Collaboration: Work closely with our clients internal teams including infrastructure application and compliance teams to ensure coordinated incident handling.

  • Playbook Execution: Follow and refine client-specific response playbooks and standard operating procedures (SOPs).

  • Shift Handover: Ensure clear and complete handover documentation between shifts to maintain continuity of operations.

Required Skills & Qualifications

  • 13 years of experience in a SOC or cybersecurity operations role.

  • Familiarity with SIEM platforms (e.g. Microsoft Sentinel LogRhythm) ticketing systems (e.g. ServiceNow Xurrent) and endpoint protection tools (e.g. Microsoft Defender SentinelOne).

  • Experience supporting and resolving common SOC playbook scenarios (e.g. phishing emails Windows/Linux malware Microsoft 365/Entra ID account compromise)

  • Strong analytical skills and attention to detail in reviewing logs alerts and incident data.

  • Understanding of cybersecurity frameworks such as MITRE ATT&CK and NIST.

  • Excellent written and verbal communication skills for documenting incidents and collaborating with stakeholders.

  • Bachelors degree in Computer Science Information Security or a related field.

Preferred Certifications

  • CompTIA Security CEH or Microsoft SC-200.

  • ITIL Foundation (for understanding ticketing and service workflows).

Working Hours

  • Rotational shifts within a 16x5 schedule (Monday to Friday).

  • After-hours and weekend on-call rotation

  • Flexibility to support critical incidents outside standard hours when required.

#LI-Hybrid

#LI-SP1




Required Experience:

IC

Employment Type

Full-Time

Company Industry

About Company

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.