This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
As Associate Analyst (Level 2) CDC Analyst in Bengaluru, you’ll support the monitoring and triage of security events across Woodside’s environments, contribute to incident response efforts, and support shift operations within the Cyber Defense Center (CDC). The role is designed to develop foundational technical and operational capability, with progression toward independent detection analysis and investigation.
Job Responsibility:
Foster Safety Leadership and contribute to an inclusive and high-performing team culture
Promote psychological safety, shift handover accuracy, sustainable shift practices, & safe to speak up culture
Take ownership of assigned alerts and demonstrate accountability in triage and documentation
Show initiative in learning and applying cyber defense knowledge
Support peer learning by sharing playbook improvements and learnings
Employ a growth-mindset approach to personal development
Monitor SIEM for security alerts and perform initial triage to assess severity and priority
Investigate alerts with guidance using CDC playbooks and escalate as required
Maintain accurate records of actions taken and support handover communication
Assist in continuous improvement activities, including playbook feedback and tuning
Support basic health monitoring of log sources and telemetry
Demonstrate a 'one team' culture across our global, follow-the-sun operating model
Demonstrate focused attention to detail and commitment to process adherence
Maintain situational awareness of key tools, (e.g., Sentinel, Defender)
Contribute to effective coverage during shifts by participating in team coordination and on-call activities
Pursue relevant certifications and training to uplift individual capability
Basic investigation of suspicious activity across endpoint, identity, cloud or network
Escalate cases based on defined criteria using existing containment and response guidance
Contribute to IOC matching, alert enrichment, and incident response documentation
Ensure alerts are triaged within SLA and escalated according to playbooks
Contribute to containment efforts in low-complexity incidents under guidance
Document shift activity and maintain log hygiene
Participate in shift rotations and team retrospectives to identify improvements
Ensure that case management for escalated incidents is well documented with a detailed timeline / kill chain & all relevant artifacts archived
Requirements:
Foundational knowledge of security concepts and threat types
Experience with or exposure to SIEM and EDR tools (e.g., Microsoft Sentinel, Defender)
Ability to follow structured response workflows and collaborate effectively within a team
Strong written communication and attention to detail
Demonstrated willingness to learn and develop in a fast-paced cyber operations environment
What we offer:
Commitment to your ongoing development, including on the job opportunities and formal programs
Inclusive parental leave entitlements for both parents
Values led culture
Flexible work options
Generous annual leave, sick leave and casual leave
Cultural and religious leave with flexible public holiday opportunities
A competitive remuneration package featuring performance-based incentives with uncapped Employer Provident Fund