Information Security Analyst II
New
India RemoteFull-TimeMiddle
Salary not disclosed
Apply NowOpens the employer's application page
Job Details
- Experience
- 3+ years
- Required Skills
- RESTful APIsLinuxScriptingPostman
Requirements
- Bachelor’s degree in computer science, Computer Engineering, related field, or equivalent experience
- 3+ years' experience in SOC, IR, threat detection, or blue team operations
- Hands-on experience with SIEM/XDR platforms and alert analysis
- Strong understanding of email security, EDR, networks, and cloud basics
- Familiarity with MITRE ATT& CK, cyber kill chain
- Comfortable with Linux, scripting fundamentals, and API tools (Postman)
- Comptia Cysa+
- GCIH
Responsibilities
- Monitor and investigate alerts across SIEM, XDR, IDS/IPS, and email security tools
- Own incident response end-to-end: triage, containment, RCA, and reporting
- Improve and maintain IR playbooks and runbooks
- Run hypothesis-based threat hunts using TTPs, IOCs, and behavioral patterns
- Bring OSINT and threat intel insights into daily SOC workflows
- Monitor the dark web for leaked credentials and data exposure
- Build and tune high-quality detections using MITRE ATT&CK
- Enhance SIEM dashboards, correlation rules, and SOAR automations
- Reduce false positives and improve SOC efficiency
- Analyze network traffic, packet captures, and protocol behaviors
- Investigate phishing attempts and strengthen email security
- Onboard/validate log sources and ensure telemetry completeness
- Purple teaming to validate detections and test defenses
View Full Description & ApplyYou'll be redirected to the employer's site