Security Operations Center (SOC) Analyst

Delivery
Mumbai
Permanent

Job Title: Security Operations Center (SOC) Analyst

Job Purpose: To act as a senior-level analyst in the 24x7 Security Operations Center (SOC), responsible for advanced security event triage, log analysis, threat investigation, and response coordination using modern security platforms such as SIEM, SOAR, EDR, and Threat Intelligence systems. The L2 SOC Engineer will also contribute to dashboard optimization, incident documentation, playbook updates, and assist in the administration of key tools such as Splunk and CrowdStrike.

Qualification: Graduation

Certification:

  • CompTIA CySA+ / Security+ / CEH
  • Splunk Core Certified User / Power User
  • Microsoft AZ-500 / SC-200
  • CrowdStrike Certified Falcon Responder (CFR)

Experience: 4+ (Years)

Responsibilities:

Security Monitoring & Incident Handling

  • Triage and investigate escalated alerts from SIEM , XDR, EDR (CrowdStrike), email, and network security tools.
  • Perform log correlation and in-depth investigations using Splunk/Elastic dashboards and queries.
  • Handle incidents across endpoints, cloud (Azure/OCI/GCP), email, DLP, and network layers.
  • Respond to phishing, malware, unauthorized access, and insider threat alerts.
  • Support forensic triage using EDR tools and sandbox results (e.g., Falcon Sandbox).

SOC Engineering & SIEM Operations

  • Create, fine-tune, and optimize detection rules and dashboards in Splunk.
  • Maintain and troubleshoot Splunk forwarders, heavy forwarders, and dashboards under guidance.
  • Participate in log onboarding and validation for new sources (e.g., CSPM, EDR, DLP, Cloud tools).
  • Support automation workflows and enrichment via playbooks.

Tool Proficiency & Admin Support

  • Hands-on knowledge of:  
  • SIEM: Splunk, Elastic (optional)
  • XDR
  • EDR: CrowdStrike
  • Email Security: Mimecast
  • DLP: Forcepoint (Web/Email), Netskope (CASB/ZTNA)
  • Vulnerability Management: Nessus, Qualys
  • Threat Intel Tools: IOC lookups, sandboxing tools, OSINT

Documentation & Compliance

  • Maintain updated incident records, timelines, and evidence in ITSM or ticketing platforms.
  • Contribute to SOP/Playbook updates, audit reports, and RCA documentation.
  • Participate in compliance checks for ISO 27001 and internal audits.

Continuous Improvement

  • Suggest detection logic improvements based on new threats or recurring false positives.
  • Engage in purple teaming and threat hunting exercises as needed.

Mandatory:

  1. Bachelor’s degree in computer science, Information Technology, or related field.
  1. At least 4  years of experience in support operations
  1. Strong analytical mindset and attention to detail.
  1. Ability to prioritize under pressure and respond within SLA timelines.
  1. Proactive, accountable, and a team player.
  1. Willingness to work in shifts (24x7 SOC coverage) if required.

Apply Online

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.