Security Operations Analyst
New
IndiaFull-TimeMiddle
Salary not disclosed
Apply NowOpens the employer's application page
Job Details
- Experience
- 2–4 years
- Required Skills
- AWSPythonGCP
Requirements
- 2–4 years of experience in security operations, incident response, or SOC environments.
- Bachelor’s degree in Technology, Computer Science, Cybersecurity, or a related field from a recognized institution.
- Hands-on experience with SIEM platforms such as Chronicle, Splunk, Sentinel, or equivalent technologies.
- Familiarity with endpoint detection and response tools, preferably CrowdStrike Falcon.
- Foundational understanding of cloud security concepts across platforms such as Amazon Web Services or Google Cloud.
- Knowledge of identity-related attack patterns, including credential stuffing, MFA fatigue, and account takeover techniques.
- Ability to interpret and analyze authentication, endpoint, network, and cloud audit logs effectively.
- Strong written communication skills with the ability to document incidents and escalation summaries clearly and concisely.
- Familiarity with threat intelligence, detection engineering, and cloud security posture management concepts is a plus.
- Basic scripting or automation experience using Python or similar technologies is preferred.
- Relevant cybersecurity certifications such as CompTIA Security+, CySA+, GCIH, or GCIA are advantageous.
Responsibilities
- Monitor, analyze, and triage security alerts across SIEM, endpoint detection, cloud security, and identity management platforms.
- Perform initial investigations into suspicious activities by collecting, correlating, and analyzing logs and security telemetry from multiple sources.
- Execute containment and remediation actions within established escalation procedures and operational guidelines.
- Maintain accurate incident documentation, investigation records, and escalation summaries within security tracking systems.
- Contribute to detection engineering efforts, including rule tuning and development for threat detection platforms.
- Support maintenance and optimization of endpoint detection and prevention policies.
- Review threat intelligence feeds, correlate indicators of compromise (IOCs), and identify potential risks within internal environments.
- Investigate cloud and identity-related security anomalies, including suspicious login behavior and MFA bypass attempts.
- Support cloud incident response activities and contribute to identifying detection gaps and operational improvements.
- Develop and maintain SOC runbooks, triage procedures, and knowledge-sharing documentation to support operational consistency.
View Full Description & ApplyYou'll be redirected to the employer's site