top of page

SOC Analyst


SOC Analyst


2 Years


Infopark, Koratty


Best in the Industry



Date Posted


Job Description

Key Responsibilities of the Position

  • Monitoring of security incidents in 24x7 rotational shifts.

  • Detect Incidents by monitoring the SIEM console, Rules, Reports and Dashboards.

  • Ensure incidents are reported as tickets using ticketing tool and handled as per SLA defined for each customer. The Standard SLA time to be taken is 10 mins per incident ticket.

  • Monitor the SIEM console resources to identify any anomalies.

  • Recognize potential, successful, and unsuccessful intrusion attempts/compromises thorough review and analysis of relevant event detail and summary information.

  • Report the confirmed incidents to customers and escalate to them for further to the concerned L2 team.

  • Track incident status to closure as per Standard Operating Procedures (SOP) defined.

  • First level Triage of events as provided in Standard Operating Procedures and automate analysis if possible.

  • Monitor the health of the SIEM tool and create incidents to the engineering team for their action.

  • Assist L2 analysts in incident workflow whenever requested.

  • Proactively identify vulnerabilities in customer infrastructure environment and suggest updating of SIEM use cases to generate alerts.

  • Ensure confidentiality and protection of sensitive customer data.


Key Skills Required

  • Previous working experience as a SOC Analyst for 2 years

  • Knowledge and experience on Azure Sentinal SIEM Platform is Must

  • Knowledge and experience in operating Windows & Linux Platforms.

  • Scripting skill set (Bash, Python, Ruby, Perl, PowerShell) will be considered a plus.

  • Hands-on experience with any commercial Security Information and Event Management (SIEM) solution

  • In-depth understanding of security threats (preferably OWASP Top 10 vulnerabilities), threat attack methods and the current threat environment

  • Basic understanding of common cyber-attacks (e.g., brute force, SYN flood, session hijack, smurf etc.) and their SIEM signatures.

  • Must be Collaborative and team oriented.

  • Must have appreciable troubleshooting and analytical skills.

  • Must be able to multitask in a fast-paced environment.

  • Good Understanding of network protocols (TCP/IP stack, SSL/TLS, IPSEC, SMTP/IMAP, FTP, HTTP etc.)

  • Good Understanding of Operating System, Web Server, database, and Security devices (firewall/NIDS/NIPS) logs and log formats.

Education Qualification Requirements

  • Any bachelor’s degree in computer science

  • Priority for B. Tech (Computer Science/IT/Electronics/Communication Engineering)

  • Mandatory: CEH/Microsoft Certified: Security Operations Analyst Associate (any 1 will do)

  • Desirable: SIEM product Certifications /RHCE/CCNA/CCNP


Soft Skills Required

  • Strong written and oral communication skills

Mail your resume to

bottom of page