CrawlJobs Logo

Cyber Security Soc Analyst

https://www.soprasteria.com Logo

Sopra Steria

Location Icon

Location:
India, Chennai

Category Icon
Category:
IT - Software Development

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

The SOC Analyst (L1/L2) and Lead are responsible for proactive monitoring, detection, investigation, and response to security threats using industry-leading solutions. The Lead also guides the team, architecting and optimizing SOC workflows and systems to ensure robust organizational security.

Job Responsibility:

  • Proactive monitoring, detection, investigation, and response to security threats using industry-leading solutions
  • Guide and architect SOC workflows and systems to ensure robust organizational security
  • Threat hunting and forensic investigation
  • Administer DLP and email security systems
  • Operate Microsoft Defender for Endpoint, conduct threat hunting via EDR telemetry and memory dumps
  • Use, configure, and optimize SIEM tools (Splunk, IBM QRadar, Microsoft Sentinel, LogRhythm, ArcSight, Elastic SIEM) for threat identification and alert management
  • Guide development of SOC procedures/runbooks and continuous improvement initiatives
  • Leadership and team management

Requirements:

  • Strong knowledge of SIEM platforms and alert investigation
  • Advanced incident response, malware analysis, and RCA expertise
  • Deep knowledge of endpoint and network security tools
  • Threat hunting and forensic investigation capabilities
  • Familiarity with vulnerability management and DLP/email security
  • Experience with threat intelligence platforms and TTP mapping
  • Strong analytical, communication, and documentation skills
  • Guide development of SOC procedures/runbooks and continuous improvement initiatives
  • Administer DLP and email security systems
  • Operate Microsoft Defender for Endpoint, conduct threat hunting via EDR telemetry and memory dumps
  • Use, configure, and optimize SIEM tools (Splunk, IBM QRadar, Microsoft Sentinel, LogRhythm, ArcSight, Elastic SIEM) for threat identification and alert management
  • Leadership and team management (Lead role)
  • Scripting/automation (Python, PowerShell, Shell)
  • Cloud/hybrid security operations
  • SOAR platform experience
  • Regulatory compliance awareness (PCI DSS, GDPR, HIPAA, ISO 27001)
  • Continuous improvement and policy development mindset

Nice to have:

  • Scripting/automation (Python, PowerShell, Shell)
  • Cloud/hybrid security operations
  • SOAR platform experience
  • Regulatory compliance awareness (PCI DSS, GDPR, HIPAA, ISO 27001)
  • Continuous improvement and policy development mindset
What we offer:
  • Inclusive and respectful work environment
  • Positions open to people with disabilities

Additional Information:

Job Posted:
August 20, 2025

Employment Type:
Fulltime
Work Type:
On-site work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Cyber Security Soc Analyst

AVP - SOC Cyber Fraud Analyst

The Security Operations Center Cyber Fraud Analyst is an intermediate level posi...
Location
Location
Singapore , Singapore
Salary
Salary:
Not provided
https://www.citi.com/ Logo
Citi
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Ability to communicate effectively both orally and in writing
  • Strong knowledge of current Cyber Fraud trends including common Account Takeover techniques and banking malware
  • Deep understanding of Intrusion Detection analysis (TCP/IP, packet level analysis) as well as Application Layer Protocols (HTTP)
  • Advanced understanding of various operating systems (Windows/UNIX), and web technologies (focusing on Internet security)
  • Knowledge of cutting-edge threats and technologies affecting Web Applications
  • Experience with Big Data Technologies, ETL Tools, Data Warehouse and Business Intelligence technologies is preferred
  • Experience with any scripting language and Splunk is a plus
  • Experience with vulnerability assessment as well as penetration testing or forensic analysis fields is a plus
  • Certifications from EC-Council, GIAC, (ISC)² are preferred [CISSP, CEH, GCIA, GWAPT and CFE]
  • 5-8 years of relevant experience in Cyber Fraud or SOC
Job Responsibility
Job Responsibility
  • The analyst performs monitoring, research, assessment and analysis of Digital Fraud Attacks leveraging various Security Event Monitoring platforms including Web Threat Detection, Real Time Fraud Risk Assessment, Big Data and Digital Application Monitoring tools (Splunk, SAS, Teradata, and enterprise real time fraud detection tools)
  • Follow pre-defined actions to handle BAU and high severity issues including escalating to other support groups
  • Execute daily ad hoc tasks or lead small projects as needed
  • Create and maintain operational reports for Key Performance Indicators and weekly and monthly metrics
  • Perform assessment as well as troubleshooting to help isolate technical issues with the integration of fraud monitoring technologies
  • Participate in daily and ad hoc conference calls to manage quality assurance and documentation related tasks
  • Identify areas for tuning use cases to enhance monitoring value
  • Engage with Fraud Policy, Operations, Strategy and other teams for early detection, prevention and mitigation of detected fraudulent activities
  • Fulltime
Read More
Arrow Right

Advanced Cyber Defense Analyst

The Advanced Cyber Defense (ACD) team is a group inside the Citi Security Operat...
Location
Location
Hungary , Budapest
Salary
Salary:
Not provided
https://www.citi.com/ Logo
Citi
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 4-6 years working in the security & operations fields
  • Possessing strong fundamental knowledge of networks (TCP/IP) and operating systems (Windows/Linux)
  • Hands-on experience with cyber security solutions
  • SIEM, AV, NIDS, EDR etc.
  • Ability to investigate network traffic, read and interpret logs and packet captures, investigate email threats
  • Experience with cyber security incident response, web/shell programming as well as being familiar with malware and memory analysis techniques are advantageous
  • Fluency in English
  • Bachelor's Degree or higher preferred
Job Responsibility
Job Responsibility
  • Conduct research on new technology offerings and determine applicability in Citibank’s SOC
  • Evaluate and advise on the implementation and effectiveness of the cybersecurity safeguards to ensure that they provide the intended level of protection
  • Development of new tools, processes and procedures to enhance SOC monitoring and analysis capabilities
  • Perform risk assessments and threat modelling to identify gaps in SOC monitoring capabilities and devise strategies to minimize the risk
  • Conduct online research of the latest cyber threats and ensure those can be detected by existing in-house technologies
  • Identify redundant tasks and automate them to increase efficiency of the SOC team
  • Utilize SOAR to develop playbooks for automating complex use cases
What we offer
What we offer
  • Cafeteria Program
  • Home Office Allowance (for colleagues working in hybrid work models)
  • Paid Parental Leave Program (maternity and paternity leave)
  • Private Medical Care Program and onsite medical rooms at our offices
  • Pension Plan Contribution to voluntary pension fund
  • Group Life Insurance
  • Employee Assistance Program
  • Access to a wide variety of learning and development programs, online course libraries and upskilling platforms, such as Udemy and Degreed
  • Flexible work arrangements to support you in managing work - life balance
  • Career progression opportunities across geographies and business lines
  • Fulltime
Read More
Arrow Right

Senior Network Security Analyst

This role involves working with Cybersecurity Operations, SIEM/SOAR, and IDPS so...
Location
Location
Poland
Salary
Salary:
Not provided
https://www.hsbc.com Logo
HSBC
Expiration Date
January 16, 2026
Flip Icon
Requirements
Requirements
  • 3+ years’ experience working with Splunk and/or the Splunk Enterprise Security SIEM platform
  • Experience working in an operational SOC and/or in developing cyber-threat detection rules / logic within a SIEM environment
  • Knowledge and experience working with SOAR platforms e.g. Phantom or Splunk SOAR advantageous
  • Demonstrable understanding of IDPS platforms and technologies (on-prem) (Knowledge of cloud native IDPS offerings advantageous)
  • Knowledge and experience of working with WAF solutions (advantageous)
  • Deep understanding of network protocols and traffic analysis: DNS/HTTP/SMB/FTP etc.
  • Familiarity with regular expression and proficient in scripting skills like python (advantageous)
  • Ability to build connections and work collaboratively across internal teams, external teams, and to proactively build successful and productive working relationships
  • Willingness to continuously learn and share learnings with others
Job Responsibility
Job Responsibility
  • Collaboration with the IDPS Network Security Engineering (policy development and tuning) team
  • Analysing, reviewing and validating the quality and efficacy of IDPS policy alerting prior to ingestion into the SIEM logging pipeline
  • Collaboration with the Global Cybersecurity Operations team SMEs to design and implement robust, accurate and high-fidelity SIEM event/alert triggers based on tuned IDPS policy alerts
  • Produce and maintain documentation of all process to support the establishment of an enduring capability and to aid the Threat Detection Analyst event triage
  • Perform gap analysis of the current baseline policy against the target policy and controls
  • Provide consultation and subject matter expertise to the Cybersecurity teams as required
  • Implement and maintain an effective KPI tracking process to demonstrate continued improvement and value in relation to the integration of IDPS alerting into the global SOC workflow
  • Remain up to date on current cyber-threats and vulnerabilities, especially network related issues that could have a direct influence on IDPS policies, rules and signatures
What we offer
What we offer
  • Competitive salary
  • Annual performance-based bonus
  • Additional bonuses for recognition awards
  • Multisport card
  • Private medical care
  • Life insurance
  • One-time reimbursement of home office set-up (up to 800 PLN)
  • Corporate parties & events
  • CSR initiatives
  • Nursery discounts
  • Fulltime
Read More
Arrow Right
New

Security Operations Analyst

Location
Location
India , Bengaluru
Salary
Salary:
Not provided
take2games.com Logo
Take-Two Interactive Software, Inc.
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 3+ years of experience in a Security Operations Center, incident response team, or cyber defense role
  • Hands-on experience with SIEM/SOAR platforms (e.g., Splunk, XSOAR and XSIAM) and endpoint detection solutions (e.g., CrowdStrike, SentinelOne)
  • Deep understanding of cybersecurity fundamentals, threat detection techniques, and attack frameworks such as MITRE ATT&CK
  • Comfortable analyzing logs and events from various systems including network devices, endpoints, cloud environments, and identity providers
  • Familiarity with scripting or automation (e.g., Python, PowerShell) to enhance investigation and response workflows is a plus
  • Experience with workflow and ticketing tools like ServiceNow or Jira for incident documentation and coordination
  • Strong written and verbal communication skills — able to clearly document findings, articulate risk, and support incident coordination across teams
  • Bachelor’s degree in Computer Science, Cybersecurity, Information Security, or Cybersecurity Engineering are a plus
  • One or more relevant certifications such as: CompTIA: Network+, Security+, CySA+, PenTest+, Cloud+ and Cloud Security: AWS Security Specialty, Google Professional Cloud Security Engineer and Microsoft Azure Security Engineer Associate are plus
Job Responsibility
Job Responsibility
  • Perform real-time security event monitoring, triage, and analysis across multiple platforms, using SIEM and EDR tools
  • Analyze log and telemetry data from diverse sources (e.g., firewalls, endpoint protection, IDS/IPS, application logs) to detect and respond to potential threats
  • Investigate and respond to security incidents, performing root cause analysis and supporting containment, eradication, and recovery efforts across endpoints, servers, cloud, and network environments
  • Conduct proactive threat hunting using behavioral analytics, threat intelligence, and hypothesis-driven queries to detect stealthy or novel attack techniques
  • Support the SOC's daily operational cadence, including participating in shift handoffs, reviewing detection effectiveness, and maintaining situational awareness of the global threat landscape
  • Contribute to the development and refinement of incident response processes, detection rules, and SOC playbooks
  • Collaborate with threat intelligence, engineering, and infrastructure teams to develop detection use cases and improve overall SOC effectiveness
  • Help shape SOC dashboards, reports, and playbooks that enhance visibility and response across business units and geographies
What we offer
What we offer
  • Discretionary bonus
  • Provident fund contributions
  • 1+5 medical insurance + top up options and access to Practo online Doctor consultation App
  • Employee assistance program
  • 3X CTC Life Assurance
  • 3X CTC Personal accident insurance
  • childcare services
  • 20 days holiday + statutory holidays
  • Gym reimbursement up to INR1150 per month
  • wellbeing program with the chance to earn up to $93 per annum
Read More
Arrow Right

SOC Operations Manager

This is an exceptional opportunity to lead, shape, and elevate a Security Operat...
Location
Location
United Kingdom , Hemel Hempstead
Salary
Salary:
80000.00 - 90000.00 GBP / Year
thepeoplenetwork.co.uk Logo
Fynity
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Proven experience leading SOC operations in a 24×7 or multi-client environment
  • Strong background in incident management, threat detection, and escalation processes
  • Technical depth across SIEM/SOAR tooling, preferably Splunk or Microsoft Sentinel
  • A passion for developing teams — coaching analysts and building collaborative, high-performing cultures
  • Strong understanding of frameworks and standards such as NIST, MITRE ATT&CK, ISO 27001, CREST, and ITIL
  • Excellent communication skills, with the ability to translate technical risks into clear business impacts
  • Security Clearance – Willing and Able to go through the DV process
  • Have held budgetary responsibility
Job Responsibility
Job Responsibility
  • Lead and develop a skilled SOC team, inspiring a culture of continuous learning and technical excellence
  • Oversee the full lifecycle of security incidents — from detection through to resolution and review
  • Manage and optimise SIEM and SOAR platforms (Splunk, Sentinel, Elastic) to enhance detection and automation capabilities
  • Drive continuous improvement through ITIL-aligned processes and adherence to CREST standards
  • Oversee vulnerability management, threat intelligence, and incident response plans
  • Communicate security posture, risks, and incident outcomes clearly to senior stakeholders
  • Ensure operational readiness and contribute to maintaining industry accreditations
  • Fulltime
Read More
Arrow Right
New

Managed Cloud Detection and Response Analyst

Wiz is looking for a Managed Cloud Detection and Response Analyst to join our ne...
Location
Location
Israel , Tel Aviv
Salary
Salary:
Not provided
wiz.io Logo
Wiz
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 2+ years of experience in a Security Operations Center or Managed Detection and Response, specifically involving cloud environments
  • Solid knowledge in Cloud Security, with familiarity in cloud services, Kubernetes, cloud architecture, and major providers (AWS, GCP, Azure)
  • Strong analytical skills with a detail-oriented mindset, capable of assessing complex security incidents, separating false positives from true compromise, and providing actionable insights
  • Passion for continuous learning and improvement, staying up-to-date on the latest trends, threats, and best practices in cloud security
  • Excellent communication skills verbal and written both in Hebrew and English
Job Responsibility
Job Responsibility
  • Continuously monitor customers’ cloud environments and workloads for security alerts and analyze potential cyber threats to identify and prioritize cyber security incidents
  • Triage prioritized cyber incidents and coordinate appropriate response actions to mitigate risks effectively
  • Work closely with customer teams to guide and assist with investigation and remediation of incidents
  • Create and deliver incident reports that document findings and response actions taken for customers
  • Write and implement custom detection rules and fine-tune alerts to enhance threat detection capabilities for the customer’s specific cloud environment
  • Develop and maintain cyber incident response playbooks to standardize procedures and enhance the internal methodology of the team
  • Stay up to date with the latest threats, vulnerabilities, and trends in cloud security to update response strategies and improve detection methods
Read More
Arrow Right

Principal Cybersecurity Incident Response Analyst

Principal Cybersecurity Incident Response Analyst role at HPE's Cyber Defense Ce...
Location
Location
India , Bangalore
Salary
Salary:
Not provided
https://www.hpe.com/ Logo
Hewlett Packard Enterprise
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor's degree (or equivalent work experience) required, preferably in computer science, engineering or related area of study
  • Typically 8+ years of relevant experience
  • SOC team/Incident response/Advanced threat analyst experience is required
  • Proven track record of leading complex cybersecurity initiatives and managing ambiguous incidents
  • Extensive understanding of adversary tactics, techniques, and procedures (TTPs)
  • Extensive Cyber and IT security knowledge
  • Extensive understanding of Cyber and IT security risks, best practices, threats and prevention measures
  • Extensive understanding of SQL and relevant scripting languages
  • Extensive data security system analysis skills
  • Extensive risk assessment and management skills
Job Responsibility
Job Responsibility
  • Lead and coordinate responses to the most severe and complex cybersecurity incidents
  • Guide cross-functional teams through containment, eradication, and recovery
  • Provide executive-level oversight and decision-making during critical incidents
  • Effectively analyze associated logs and respond to high severity incidents
  • Contribute to the company's security response methods
  • Mentor and provide technical guidance to less experienced cybersecurity professionals
  • Stay at the forefront of cybersecurity trends, threats, and technologies
  • Foster a culture of continuous improvement and innovation
  • Provide insight and guidance through after action reviews
What we offer
What we offer
  • Health & Wellbeing benefits
  • Personal & Professional Development programs
  • Unconditional Inclusion environment
  • Comprehensive benefits suite supporting physical, financial and emotional wellbeing
  • Fulltime
Read More
Arrow Right

Service Delivery Manager - Managed Security

HPE Operations is our innovative IT services organization. It provides the exper...
Location
Location
India , Bangalore
Salary
Salary:
Not provided
https://www.hpe.com/ Logo
Hewlett Packard Enterprise
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 5+ years of experience in managed security services, cybersecurity delivery management, or IT service management
  • Proven track record of managing complex client relationships and delivering managed services
  • Experience working with Security Operations Centers (SOC) or MSSPs is highly desirable
  • Should have managed a team of Cyber Security engineers including SIEM, Vulnerability, IAM, HSM, etc
  • Experience in at least 3 of the below products is desirable: Microsoft Sentinel with Copilot, Microsoft Defender including VA, Thales HSM & Cipher Trust Manager, CyberArk PAM, Nexus Smart ID
Job Responsibility
Job Responsibility
  • Oversee the end-to-end delivery of managed security services, such as threat monitoring, incident response, vulnerability management, endpoint protection, and other cybersecurity services
  • Ensure services are delivered in compliance with Service Level Agreements (SLAs) and established security frameworks (e.g., NIST, ISO 27001)
  • Monitor and measure the performance of managed security services, identifying areas for improvement and ensuring high-quality service delivery
  • Manage and coordinate teams responsible for delivering managed security services, including security analysts, engineers, and consultants
  • Collaborate with internal teams (e.g., SOC, engineering, compliance) to ensure seamless service delivery and resolution of client issues
  • Provide leadership, guidance, and support to team members, fostering a culture of accountability and continuous improvement
What we offer
What we offer
  • Health & Wellbeing
  • Personal & Professional Development
  • Unconditional Inclusion
  • Fulltime
Read More
Arrow Right
Welcome to CrawlJobs.com
Your Global Job Discovery Platform
At CrawlJobs.com, we simplify finding your next career opportunity by bringing job listings directly to you from all corners of the web. Using cutting-edge AI and web-crawling technologies, we gather and curate job offers from various sources across the globe, ensuring you have access to the most up-to-date job listings in one place.