CrawlJobs Logo

SOC Incident Responder

https://www.citi.com/ Logo

Citi

Location Icon

Location:
Singapore , Singapore

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

The Info Sec Tech Lead Analyst is a senior level professional position responsible for driving efforts to prevent, monitor and respond to information/data breaches and cyber-attacks. The overall objective of this role is to ensure the execution of Information Security directives and activities in alignment with Citi's data security policy.

Job Responsibility:

  • Identify opportunities to automate and standardize information security controls and for the supported groups
  • Resolve any vulnerabilities or issues detected in an application or infrastructure
  • Analyze source code to mitigate identified weaknesses and vulnerabilities within the system
  • Review and validate automated testing results and prioritize actions that resolve issues based on overall risk
  • Scan and analyze applications with automated tools, and perform manual testing if necessary
  • Reduce risk by analyzing the root cause of issues, their impact, and required corrective actions
  • Direct the development and delivery of secure solutions by coordinating with business and technical contacts
  • Appropriately assess risk when business decisions are made, demonstrating particular consideration for the firm's reputation and safeguarding Citigroup, its clients and assets, by driving compliance with applicable laws, rules and regulations, adhering to Policy, applying sound ethical judgment regarding personal behavior, conduct and business practices, and escalating, managing and reporting control issues with transparency.

Requirements:

  • 6-10 years of relevant experience
  • Advanced proficiency with Microsoft Office tools and software
  • Consistently demonstrates clear and concise written and verbal communication
  • Proven influencing and relationship management skills
  • Proven analytical skills
  • Bachelor’s degree/University degree or equivalent experience
  • Master’s degree preferred

Additional Information:

Job Posted:
December 29, 2025

Employment Type:
Fulltime
Work Type:
Hybrid work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for SOC Incident Responder

Principal Cybersecurity Incident Response Analyst

Principal Cybersecurity Incident Response Analyst role at HPE's Cyber Defense Ce...
Location
Location
India , Bangalore
Salary
Salary:
Not provided
https://www.hpe.com/ Logo
Hewlett Packard Enterprise
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor's degree (or equivalent work experience) required, preferably in computer science, engineering or related area of study
  • Typically 8+ years of relevant experience
  • SOC team/Incident response/Advanced threat analyst experience is required
  • Proven track record of leading complex cybersecurity initiatives and managing ambiguous incidents
  • Extensive understanding of adversary tactics, techniques, and procedures (TTPs)
  • Extensive Cyber and IT security knowledge
  • Extensive understanding of Cyber and IT security risks, best practices, threats and prevention measures
  • Extensive understanding of SQL and relevant scripting languages
  • Extensive data security system analysis skills
  • Extensive risk assessment and management skills
Job Responsibility
Job Responsibility
  • Lead and coordinate responses to the most severe and complex cybersecurity incidents
  • Guide cross-functional teams through containment, eradication, and recovery
  • Provide executive-level oversight and decision-making during critical incidents
  • Effectively analyze associated logs and respond to high severity incidents
  • Contribute to the company's security response methods
  • Mentor and provide technical guidance to less experienced cybersecurity professionals
  • Stay at the forefront of cybersecurity trends, threats, and technologies
  • Foster a culture of continuous improvement and innovation
  • Provide insight and guidance through after action reviews
What we offer
What we offer
  • Health & Wellbeing benefits
  • Personal & Professional Development programs
  • Unconditional Inclusion environment
  • Comprehensive benefits suite supporting physical, financial and emotional wellbeing
  • Fulltime
Read More
Arrow Right

L2 SOC Analyst

Quzara, a leading Cyber Security Firm, is seeking a highly skilled and experienc...
Location
Location
United States
Salary
Salary:
Not provided
quzara.com Logo
Quzara
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • At least 5+ years of experience in a SOC Analyst role at a SOC/MXDR or MSSP with L2 experience
  • Strong understanding of networking technologies
  • Experience with Microsoft security technologies such as Microsoft Sentinel and M365 Defender
  • Strong understanding of security best practices and incident response procedures
  • Experience with deep threat intelligence
  • Strong proficiency with KQL Queries
  • Strong verbal and written communication skills
  • Strong analytical and problem-solving skills
  • Azure experience working with azure security is a must
  • Experience with scripting languages such as Python, PowerShell, and JavaScript
Job Responsibility
Job Responsibility
  • Monitor and analyze security events utilizing advanced security technologies and tools such as Microsoft Sentinel, Defender technologies, and Log Analytics
  • Utilize deep threat intelligence to identify and investigate potential security threats
  • Respond to and triage security incidents, escalating as necessary
  • Utilize proficiency in KQL Queries to conduct investigations and gain insights into potential security threats
  • Collaborate with other teams to resolve security incidents and improve overall security posture
  • Participate in incident response efforts and assist in forensic investigations, adhering to NIST guidelines
  • Continuously improve security operations through the identification of trends and anomalies
  • Communicate security incidents and findings to stakeholders and management
  • Fulltime
Read More
Arrow Right

Operations Security Consultant

The Operations Security Consultant is responsible for the end-to-end management ...
Location
Location
India , Chennai
Salary
Salary:
Not provided
https://www.soprasteria.com Logo
Sopra Steria
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 8 to 12 years experience
  • B.E./ B.Tech./ MCA degree
  • Hands-on expertise with QRadar SIEM, SOC operations, and incident response
  • Proficiency in security frameworks: NIST CSF, CIS Controls, DORA, GDPR
  • Experience with vulnerability management, threat hunting, and risk assessment methodologies
  • Familiarity with automation, SOAR solutions, and operational workflow optimization
  • Strong experience on at least one technical environment: Cloud (AWS/Azure), Mainframe, Datawarehouse, Database, O365
  • CISSP or CISM certification preferred
Job Responsibility
Job Responsibility
  • Oversee Daily security operations and maintain operational excellence
  • Manage 24/7 monitoring, triage, investigation, and resolution of security incidents via SIEM (QRadar)
  • Coordinate incident management efforts across internal teams and external stakeholders
  • Develop, fine-tune, and manage security detection rules, use cases, and threat intelligence integration
  • Implement continuous improvement processes using KPIs, operational reviews, and performance metrics
  • Manage Lead SOC analysts, threat hunters, and incident responders
  • Facilitate collaboration across engineering, compliance, and client teams
  • Ensure compliance with ISO 27001, NIST CSF, CIS Controls, DORA, GDPR, and client-specific standards
  • Lead preparation of audits, client reports, and executive dashboards
  • Maintain risk treatment plans aligned with ISO 27001 standards
What we offer
What we offer
  • Commitment to fighting against all forms of discrimination
  • Inclusive and respectful work environment
  • Positions open to people with disabilities
  • Fulltime
Read More
Arrow Right

Gaming Principal, Cloud Threat Detection & Incident Response Engineer

We are seeking a Gaming Principal, Cloud Threat Detection & Incident Response En...
Location
Location
United States , Multiple Locations
Salary
Salary:
139900.00 - 274800.00 USD / Year
https://www.microsoft.com/ Logo
Microsoft Corporation
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Doctorate in Statistics, Mathematics, Computer Science, or related field AND 3+ years experience in software development lifecycle, large-scale computing, threat modeling, cyber security, anomaly detection, Security Operations Center (SOC) detection, threat analytics, security incident and event management (SIEM), information technology (IT), or operations incident response
  • OR Master's Degree in Statistics, Mathematics, Computer Science, or related field AND 4+ years experience in software development lifecycle, large-scale computing, threat modeling, cyber security, anomaly detection, Security Operations Center (SOC) detection, threat analytics, security incident and event management (SIEM), information technology (IT), or operations incident response
  • OR Bachelor's Degree in Statistics, Mathematics, Computer Science, or related field AND 6+ years experience in software development lifecycle, large-scale computing, threat modeling, cyber security, anomaly detection, Security Operations Center (SOC) detection, threat analytics, security incident and event management (SIEM), information technology (IT), or operations incident response
  • OR equivalent experience
Job Responsibility
Job Responsibility
  • Architect and drive Gaming’s cloud-first detection and response vision by integrating Azure, AWS, and GCP (Google Cloud Platform) native security services and telemetry sources into TDIR (Threat Detection, Investigation, and Response) workflows
  • Lead adoption and optimization of Microsoft Defender for Cloud, Sentinel, Entra ID security, Defender for Cloud Apps, and other cloud-native security controls
  • Establish standards and reference architectures for cloud telemetry ingestion, normalization, enrichment, and threat analytics across diverse studio environments
  • Build and maintain high-fidelity, cloud-native detections targeting threat actors across identity, SaaS, PaaS, IaaS, and Kubernetes environments
  • Develop behavioral detections leveraging KQL (Kusto Query Language), automation, analytics, and ML-assisted methodologies
  • Partner with threat intelligence to map adversary TTPs (Tactics, Techniques, and Procedures) to cloud control surfaces and turn insights into durable detection engineering roadmaps
  • Serve as principal technical authority during major cloud-related incidents, providing expert guidance on identity compromise, lateral movement, key/material theft, resource manipulation, and multi-cloud attack paths
  • Formalize standards for cloud investigations, including telemetry requirements, visibility gaps, and automated triage workflows
  • Drive post-incident cloud hardening by influencing product teams, studio engineering, and platform owners
  • Architect and implement automation for detection deployment, evidence collection, containment, and remediation using Azure Functions, Logic Apps, and modern SOAR patterns
  • Fulltime
Read More
Arrow Right
New

Security Operations Analyst

The Security Operations Analyst is a member of the IT Infrastructure & Security ...
Location
Location
India , Gurugram
Salary
Salary:
Not provided
spectramedix.com Logo
SpectraMedix
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 2–4 years of experience in security operations, SOC, or incident response roles
  • Hands-on experience monitoring and responding to security alerts
  • Familiarity with endpoint detection and response (EDR), SIEM, and log monitoring tools
  • Working knowledge of: Networking items (TCP/IP, DNS, HTTPS, SSH, SFTP). Authentication and access control concepts. Intrusion detection, malware, phishing, and common attack techniques
  • Experience working within documented procedures and escalation models
  • Must have worked with US based clients in onsite/off shore delivery model
  • Strong verbal and written communication, technical articulation, listening, and presentation skills are essential
  • Should have proven analytical and problem-solving skills
  • Demonstrated expertise in prioritization, time management, and stakeholder management (both internal and external) is necessary
  • Should be a quick learner, self-starter, proactive, and an effective team player
Job Responsibility
Job Responsibility
  • Monitor, triage, and investigate security alerts generated by security tools (e.g., Sophos, Azure Monitor, Log360, server OS and application logs)
  • Act as the first responder for confirmed security events, including malware detections, suspicious logins, anomalous system behavior, and phishing reports
  • Perform containment actions (e.g., isolate endpoints, disable accounts, block indicators) following approved procedures
  • Escalate incidents to the IT Security Analyst or Incident Response team with documented findings and evidence
  • Maintain accurate incident records, timelines, and response actions in incident tracking systems
  • Execute daily, weekly, monthly, quarterly, and annual security operational tasks as defined in the System Security Plan and security runbooks
  • Review endpoint, server, and system logs for indicators of compromise or policy violations
  • Validate vulnerability scan results and assist with remediation tracking
  • Assist with access reviews, security control verification, and operational evidence collection
  • Analyze reported phishing emails and user-submitted security issues or concerns
Read More
Arrow Right

Cyber Defence Analyst

We are seeking a skilled and proactive Cyber Defence Analyst to join our Securit...
Location
Location
India , Bangalore
Salary
Salary:
Not provided
vodafone.com Logo
Vodafone
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Minimum 3 years of experience in Cyber Security, SOC operations, SIEM, and incident management
  • Strong understanding of network and security concepts and SIEM technologies (e.g., ArcSight, Splunk, QRadar, LogRhythm)
  • Holds industry-recognised certifications such as CEH, CCNA Cyber Ops, Security+
  • Excellent analytical and communication skills
  • Degree in Computer Science, Information Technology, Engineering, or a related field
  • Experience in global customer handling and event analysis
  • Demonstrates integrity, self-motivation, and cultural sensitivity
Job Responsibility
Job Responsibility
  • Investigate, analyse, and triage security alerts using CSOC tools
  • Document event and case analysis in the incident management system and manage cases through closure
  • Perform historical analysis of detected events and support incident managers
  • Participate in daily stand-up calls and contribute to knowledge base development
  • Collaborate with local market CSIRT teams and ensure effective communication across global teams
  • Proactively reduce alert volumes through fine-tuning and process stabilisation
  • Communicate emerging threats and malware behaviours clearly to stakeholders
  • Ensure mitigation measures are in place to reduce spam and phishing alerts
  • Maintain composure under pressure and respond effectively during emergencies
What we offer
What we offer
  • Opportunity to work in a global 24/7 cyber defence environment
  • Exposure to advanced security tools and technologies
  • Collaboration with international teams and senior security experts
  • Contribution to Vodafone’s mission to protect digital assets and infrastructure
  • A dynamic and inclusive workplace that values continuous learning and innovation
Read More
Arrow Right

L1 Cyber Defence Analyst

We are seeking a skilled and proactive Cyber Defence Analyst to join our Securit...
Location
Location
India , Pune
Salary
Salary:
Not provided
vodafone.com Logo
Vodafone
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Minimum 3 years of experience in Cyber Security, SOC operations, SIEM, and incident management
  • Strong understanding of network and security concepts and SIEM technologies (e.g., ArcSight, Splunk, QRadar, LogRhythm)
  • Holds industry-recognised certifications such as CEH, CCNA Cyber Ops, Security+
  • Excellent analytical and communication skills
  • Degree in Computer Science, Information Technology, Engineering, or a related field
  • Experience in global customer handling and event analysis
  • Demonstrates integrity, self-motivation, and cultural sensitivity
Job Responsibility
Job Responsibility
  • Investigate, analyse, and triage security alerts using CSOC tools
  • Document event and case analysis in the incident management system and manage cases through closure
  • Perform historical analysis of detected events and support incident managers
  • Participate in daily stand-up calls and contribute to knowledge base development
  • Collaborate with local market CSIRT teams and ensure effective communication across global teams
  • Proactively reduce alert volumes through fine-tuning and process stabilisation
  • Communicate emerging threats and malware behaviours clearly to stakeholders
  • Ensure mitigation measures are in place to reduce spam and phishing alerts
  • Maintain composure under pressure and respond effectively during emergencies
What we offer
What we offer
  • Opportunity to work in a global 24/7 cyber defence environment
  • Exposure to advanced security tools and technologies
  • Collaboration with international teams and senior security experts
  • Contribution to Vodafone’s mission to protect digital assets and infrastructure
  • A dynamic and inclusive workplace that values continuous learning and innovation
Read More
Arrow Right

Cybersecurity Specialist

Unox, market leader in the production of high-end ovens, certified as a Great Pl...
Location
Location
Italy , Cadoneghe, Padova
Salary
Salary:
Not provided
unox.com Logo
UNOX
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Effective communication in English and Italian, written and spoken
  • 3+ years of experience in administration of hybrid Microsoft environments
  • Excellent analytical, troubleshooting and problem-solving skills
  • Continuous and contagious positive attitude, encouraging a team-oriented, collaborative environment
  • An innate curiosity and propension to understand and apply existing and new technologies
  • Propension to work in a timely, accurate, and professional manner while providing technical support
  • Ability to independently prioritize and execute tasks in a fast-paced environment
  • Senior (5-10 years)
Job Responsibility
Job Responsibility
  • Endure the continuity of the IT infrastructure of UNOX
  • Ensure the backup infrastructure run smoothly, according to data retention policies and SLA
  • Configure and monitor the company’s cybersecurity platforms (e.g. SIEM, XDR, Email Security, …)
  • Performs periodical disaster recovery tests on critical infrastructure, monitoring RPO and RTO
  • Provide frontline employee support by responding and resolving users’ issues
  • Coordinate efforts with the company SOC in order to respond to incidents and strengthen the overall security posture on the Identity Management infrastructure, clients, servers, and network
  • Perform periodical cybersecurity assessments and actively implement the remediations suggested
  • Ensure the tiering of the infrastructure and use Zero Trust concepts/Privileged Access Management tools
  • Proactively suggest and implement new software and organizational changes that improve the overall security posture while meeting also flexibility and business goals (e.g. passwordless)
  • Contribute to automation and health of asset management solutions (MDM)
What we offer
What we offer
  • Flexible Working Hours
  • Work-Life balance initiatives
  • Paid time off & overtime
  • Company canteen
  • Personal and family welfare
  • Health insurance & welfare programs
  • Pension & retirement plans
  • Mentorship & coaching
  • Career growth & training programs
  • Diversity & inclusion policies
  • Fulltime
Read More
Arrow Right