Security Operations Analyst

New
IndiaFull-TimeMiddle
Salary not disclosed
Apply NowOpens the employer's application page

Job Details

Experience
2–4 years
Required Skills
AWSPythonGCP

Requirements

  • 2–4 years of experience in security operations, incident response, or SOC environments.
  • Bachelor’s degree in Technology, Computer Science, Cybersecurity, or a related field from a recognized institution.
  • Hands-on experience with SIEM platforms such as Chronicle, Splunk, Sentinel, or equivalent technologies.
  • Familiarity with endpoint detection and response tools, preferably CrowdStrike Falcon.
  • Foundational understanding of cloud security concepts across platforms such as Amazon Web Services or Google Cloud.
  • Knowledge of identity-related attack patterns, including credential stuffing, MFA fatigue, and account takeover techniques.
  • Ability to interpret and analyze authentication, endpoint, network, and cloud audit logs effectively.
  • Strong written communication skills with the ability to document incidents and escalation summaries clearly and concisely.
  • Familiarity with threat intelligence, detection engineering, and cloud security posture management concepts is a plus.
  • Basic scripting or automation experience using Python or similar technologies is preferred.
  • Relevant cybersecurity certifications such as CompTIA Security+, CySA+, GCIH, or GCIA are advantageous.

Responsibilities

  • Monitor, analyze, and triage security alerts across SIEM, endpoint detection, cloud security, and identity management platforms.
  • Perform initial investigations into suspicious activities by collecting, correlating, and analyzing logs and security telemetry from multiple sources.
  • Execute containment and remediation actions within established escalation procedures and operational guidelines.
  • Maintain accurate incident documentation, investigation records, and escalation summaries within security tracking systems.
  • Contribute to detection engineering efforts, including rule tuning and development for threat detection platforms.
  • Support maintenance and optimization of endpoint detection and prevention policies.
  • Review threat intelligence feeds, correlate indicators of compromise (IOCs), and identify potential risks within internal environments.
  • Investigate cloud and identity-related security anomalies, including suspicious login behavior and MFA bypass attempts.
  • Support cloud incident response activities and contribute to identifying detection gaps and operational improvements.
  • Develop and maintain SOC runbooks, triage procedures, and knowledge-sharing documentation to support operational consistency.
View Full Description & ApplyYou'll be redirected to the employer's site
View details
Apply Now