Security Operations Analyst
A
AlphaSenseMarket Intelligence
Remote - IndiaFull-TimeMiddle
Salary not disclosed
Apply NowOpens the employer's application page
Job Details
- Experience
- 2–4 years
- Required Skills
- AWSGCP
Requirements
- 2–4 years of SOC, incident response, or security operations experience
- Bachelor's degree (B. Tech) from a Tier1, Tier2 institution
- Hands-on experience with a SIEM platform (Chronicle, Splunk, Sentinel, or equivalent)
- Familiarity with EDR tooling (CrowdStrike Falcon preferred)
- Foundational understanding of cloud security concepts across AWS or GCP
- Working knowledge of identity threat patterns (credential stuffing, MFA fatigue, account takeover)
- Ability to read and interpret logs: authentication, network, endpoint, and cloud audit trails
- Strong written communication skills for incident documentation and escalation summaries
Responsibilities
- Monitor and triage security alerts across SIEM, EDR, cloud security, identity and other platforms
- Perform initial investigation on escalated events, collecting and correlating evidence across log sources
- Execute containment and remediation actions under defined escalation thresholds
- Maintain accurate and timely documentation in the incident tracking system
- Contribute to YARA-L rule development and tuning in Chronicle/Google SecOps
- Assist with CrowdStrike Falcon IOA and prevention policy maintenance
- Review and act on SOCRadar threat intelligence feeds
- Triage cloud security findings and investigate identity anomalies
- Author and maintain SOC runbooks and triage playbooks
View Full Description & ApplyYou'll be redirected to the employer's site