CrawlJobs Logo

Cyber Security Soc Analyst

https://www.soprasteria.com Logo

Sopra Steria

Location Icon

Location:
India , Chennai

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

The SOC Analyst (L1/L2) and Lead are responsible for proactive monitoring, detection, investigation, and response to security threats using industry-leading solutions. The Lead also guides the team, architecting and optimizing SOC workflows and systems to ensure robust organizational security.

Job Responsibility:

  • Proactive monitoring, detection, investigation, and response to security threats using industry-leading solutions
  • Guide and architect SOC workflows and systems to ensure robust organizational security
  • Threat hunting and forensic investigation
  • Administer DLP and email security systems
  • Operate Microsoft Defender for Endpoint, conduct threat hunting via EDR telemetry and memory dumps
  • Use, configure, and optimize SIEM tools (Splunk, IBM QRadar, Microsoft Sentinel, LogRhythm, ArcSight, Elastic SIEM) for threat identification and alert management
  • Guide development of SOC procedures/runbooks and continuous improvement initiatives
  • Leadership and team management

Requirements:

  • Strong knowledge of SIEM platforms and alert investigation
  • Advanced incident response, malware analysis, and RCA expertise
  • Deep knowledge of endpoint and network security tools
  • Threat hunting and forensic investigation capabilities
  • Familiarity with vulnerability management and DLP/email security
  • Experience with threat intelligence platforms and TTP mapping
  • Strong analytical, communication, and documentation skills
  • Guide development of SOC procedures/runbooks and continuous improvement initiatives
  • Administer DLP and email security systems
  • Operate Microsoft Defender for Endpoint, conduct threat hunting via EDR telemetry and memory dumps
  • Use, configure, and optimize SIEM tools (Splunk, IBM QRadar, Microsoft Sentinel, LogRhythm, ArcSight, Elastic SIEM) for threat identification and alert management
  • Leadership and team management (Lead role)
  • Scripting/automation (Python, PowerShell, Shell)
  • Cloud/hybrid security operations
  • SOAR platform experience
  • Regulatory compliance awareness (PCI DSS, GDPR, HIPAA, ISO 27001)
  • Continuous improvement and policy development mindset

Nice to have:

  • Scripting/automation (Python, PowerShell, Shell)
  • Cloud/hybrid security operations
  • SOAR platform experience
  • Regulatory compliance awareness (PCI DSS, GDPR, HIPAA, ISO 27001)
  • Continuous improvement and policy development mindset
What we offer:
  • Inclusive and respectful work environment
  • Positions open to people with disabilities

Additional Information:

Job Posted:
August 20, 2025

Employment Type:
Fulltime
Work Type:
On-site work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Cyber Security Soc Analyst

SOC Cyber Fraud Analyst

The Security Operations Center Cyber Fraud Analyst is an intermediate level posi...
Location
Location
Singapore , Singapore
Salary
Salary:
Not provided
https://www.citi.com/ Logo
Citi
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 3-5 years of relevant experience in Cyber Fraud or SOC
  • Ability to communicate effectively both orally and in writing
  • Strong knowledge of current Cyber Fraud trends including common Account Takeover techniques and banking malware
  • Deep understanding of Intrusion Detection analysis (TCP/IP, packet level analysis) as well as Application Layer Protocols (HTTP)
  • Advanced understanding of various operating systems (Windows/UNIX), and web technologies (focusing on Internet security)
  • Knowledge of cutting-edge threats and technologies affecting Web Applications
  • Consistently demonstrates clear and concise written and verbal communication
  • Proven influencing and relationship management skills
  • Proven analytical skills
  • Bachelor’s degree/University degree or equivalent experience
Job Responsibility
Job Responsibility
  • Perform monitoring, research, assessment and analysis of Digital Fraud Attacks leveraging various Security Event Monitoring platforms
  • Follow pre-defined actions to handle BAU and high severity issues including escalating to other support groups
  • Execute daily ad hoc tasks or lead small projects as needed
  • Create and maintain operational reports for Key Performance Indicators and weekly and monthly metrics
  • Perform assessment as well as troubleshooting to help isolate technical issues with the integration of fraud monitoring technologies
  • Participate in daily and ad hoc conference calls to manage quality assurance and documentation related tasks
  • Identify areas for tuning use cases to enhance monitoring value
  • Engage with Fraud Policy, Operations, Strategy and other teams for early detection, prevention and mitigation of detected fraudulent activities
  • Fulltime
Read More
Arrow Right

AVP - SOC Cyber Fraud Analyst

The Security Operations Center Cyber Fraud Analyst is an intermediate level posi...
Location
Location
Singapore , Singapore
Salary
Salary:
Not provided
https://www.citi.com/ Logo
Citi
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Ability to communicate effectively both orally and in writing
  • Strong knowledge of current Cyber Fraud trends including common Account Takeover techniques and banking malware
  • Deep understanding of Intrusion Detection analysis (TCP/IP, packet level analysis) as well as Application Layer Protocols (HTTP)
  • Advanced understanding of various operating systems (Windows/UNIX), and web technologies (focusing on Internet security)
  • Knowledge of cutting-edge threats and technologies affecting Web Applications
  • Experience with Big Data Technologies, ETL Tools, Data Warehouse and Business Intelligence technologies is preferred
  • Experience with any scripting language and Splunk is a plus
  • Experience with vulnerability assessment as well as penetration testing or forensic analysis fields is a plus
  • Certifications from EC-Council, GIAC, (ISC)² are preferred [CISSP, CEH, GCIA, GWAPT and CFE]
  • 5-8 years of relevant experience in Cyber Fraud or SOC
Job Responsibility
Job Responsibility
  • The analyst performs monitoring, research, assessment and analysis of Digital Fraud Attacks leveraging various Security Event Monitoring platforms including Web Threat Detection, Real Time Fraud Risk Assessment, Big Data and Digital Application Monitoring tools (Splunk, SAS, Teradata, and enterprise real time fraud detection tools)
  • Follow pre-defined actions to handle BAU and high severity issues including escalating to other support groups
  • Execute daily ad hoc tasks or lead small projects as needed
  • Create and maintain operational reports for Key Performance Indicators and weekly and monthly metrics
  • Perform assessment as well as troubleshooting to help isolate technical issues with the integration of fraud monitoring technologies
  • Participate in daily and ad hoc conference calls to manage quality assurance and documentation related tasks
  • Identify areas for tuning use cases to enhance monitoring value
  • Engage with Fraud Policy, Operations, Strategy and other teams for early detection, prevention and mitigation of detected fraudulent activities
  • Fulltime
Read More
Arrow Right

Digital Cyber Analyst

We are looking for a high-performing individual looking to advance their career ...
Location
Location
United Kingdom , Birmingham
Salary
Salary:
Not provided
bdo.co.uk Logo
BDO UK LLP
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Experience in using SIEM, MDR, EDR, and SOAR technologies
  • Experience working as an analyst within a SOC
  • Familiarity with relevant coding languages, e.g. Python, SQL, Robin Script, KQL, Cypher, etc.
  • One or more relevant security certification e.g. Certified Ethical Hacker, Certified SOC Analyst, Microsoft SC-200, Security+, etc.
  • Bachelor's degree in Cyber/Information security
  • Resides in the UK
  • Fluent in English
Job Responsibility
Job Responsibility
  • Manage risk for our clients to make them stronger for the future
  • Help protect our global client base from cyber threats
What we offer
What we offer
  • Agile working
  • Programmes, resources, and frameworks that provide clarity and structure around career development
  • Informal success conversations to formal mentoring and coaching
  • State-of-the-art collaboration spaces in our offices
  • Multidisciplinary events and dedicated resources
Read More
Arrow Right

Advanced Cyber Defense Analyst

The Advanced Cyber Defense (ACD) team is a group inside the Citi Security Operat...
Location
Location
Hungary , Budapest
Salary
Salary:
Not provided
https://www.citi.com/ Logo
Citi
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 4-6 years working in the security & operations fields
  • Possessing strong fundamental knowledge of networks (TCP/IP) and operating systems (Windows/Linux)
  • Hands-on experience with cyber security solutions
  • SIEM, AV, NIDS, EDR etc.
  • Ability to investigate network traffic, read and interpret logs and packet captures, investigate email threats
  • Experience with cyber security incident response, web/shell programming as well as being familiar with malware and memory analysis techniques are advantageous
  • Fluency in English
  • Bachelor's Degree or higher preferred
Job Responsibility
Job Responsibility
  • Conduct research on new technology offerings and determine applicability in Citibank’s SOC
  • Evaluate and advise on the implementation and effectiveness of the cybersecurity safeguards to ensure that they provide the intended level of protection
  • Development of new tools, processes and procedures to enhance SOC monitoring and analysis capabilities
  • Perform risk assessments and threat modelling to identify gaps in SOC monitoring capabilities and devise strategies to minimize the risk
  • Conduct online research of the latest cyber threats and ensure those can be detected by existing in-house technologies
  • Identify redundant tasks and automate them to increase efficiency of the SOC team
  • Utilize SOAR to develop playbooks for automating complex use cases
What we offer
What we offer
  • Cafeteria Program
  • Home Office Allowance (for colleagues working in hybrid work models)
  • Paid Parental Leave Program (maternity and paternity leave)
  • Private Medical Care Program and onsite medical rooms at our offices
  • Pension Plan Contribution to voluntary pension fund
  • Group Life Insurance
  • Employee Assistance Program
  • Access to a wide variety of learning and development programs, online course libraries and upskilling platforms, such as Udemy and Degreed
  • Flexible work arrangements to support you in managing work - life balance
  • Career progression opportunities across geographies and business lines
  • Fulltime
Read More
Arrow Right

Senior Network Security Analyst

This role involves working with Cybersecurity Operations, SIEM/SOAR, and IDPS so...
Location
Location
Poland
Salary
Salary:
Not provided
https://www.hsbc.com Logo
HSBC
Expiration Date
January 16, 2026
Flip Icon
Requirements
Requirements
  • 3+ years’ experience working with Splunk and/or the Splunk Enterprise Security SIEM platform
  • Experience working in an operational SOC and/or in developing cyber-threat detection rules / logic within a SIEM environment
  • Knowledge and experience working with SOAR platforms e.g. Phantom or Splunk SOAR advantageous
  • Demonstrable understanding of IDPS platforms and technologies (on-prem) (Knowledge of cloud native IDPS offerings advantageous)
  • Knowledge and experience of working with WAF solutions (advantageous)
  • Deep understanding of network protocols and traffic analysis: DNS/HTTP/SMB/FTP etc.
  • Familiarity with regular expression and proficient in scripting skills like python (advantageous)
  • Ability to build connections and work collaboratively across internal teams, external teams, and to proactively build successful and productive working relationships
  • Willingness to continuously learn and share learnings with others
Job Responsibility
Job Responsibility
  • Collaboration with the IDPS Network Security Engineering (policy development and tuning) team
  • Analysing, reviewing and validating the quality and efficacy of IDPS policy alerting prior to ingestion into the SIEM logging pipeline
  • Collaboration with the Global Cybersecurity Operations team SMEs to design and implement robust, accurate and high-fidelity SIEM event/alert triggers based on tuned IDPS policy alerts
  • Produce and maintain documentation of all process to support the establishment of an enduring capability and to aid the Threat Detection Analyst event triage
  • Perform gap analysis of the current baseline policy against the target policy and controls
  • Provide consultation and subject matter expertise to the Cybersecurity teams as required
  • Implement and maintain an effective KPI tracking process to demonstrate continued improvement and value in relation to the integration of IDPS alerting into the global SOC workflow
  • Remain up to date on current cyber-threats and vulnerabilities, especially network related issues that could have a direct influence on IDPS policies, rules and signatures
What we offer
What we offer
  • Competitive salary
  • Annual performance-based bonus
  • Additional bonuses for recognition awards
  • Multisport card
  • Private medical care
  • Life insurance
  • One-time reimbursement of home office set-up (up to 800 PLN)
  • Corporate parties & events
  • CSR initiatives
  • Nursery discounts
  • Fulltime
!
Read More
Arrow Right

Security Operations Analyst

Location
Location
India , Bengaluru
Salary
Salary:
Not provided
take2games.com Logo
Take-Two Interactive Software, Inc.
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 3+ years of experience in a Security Operations Center, incident response team, or cyber defense role
  • Hands-on experience with SIEM/SOAR platforms (e.g., Splunk, XSOAR and XSIAM) and endpoint detection solutions (e.g., CrowdStrike, SentinelOne)
  • Deep understanding of cybersecurity fundamentals, threat detection techniques, and attack frameworks such as MITRE ATT&CK
  • Comfortable analyzing logs and events from various systems including network devices, endpoints, cloud environments, and identity providers
  • Familiarity with scripting or automation (e.g., Python, PowerShell) to enhance investigation and response workflows is a plus
  • Experience with workflow and ticketing tools like ServiceNow or Jira for incident documentation and coordination
  • Strong written and verbal communication skills — able to clearly document findings, articulate risk, and support incident coordination across teams
  • Bachelor’s degree in Computer Science, Cybersecurity, Information Security, or Cybersecurity Engineering are a plus
  • One or more relevant certifications such as: CompTIA: Network+, Security+, CySA+, PenTest+, Cloud+ and Cloud Security: AWS Security Specialty, Google Professional Cloud Security Engineer and Microsoft Azure Security Engineer Associate are plus
Job Responsibility
Job Responsibility
  • Perform real-time security event monitoring, triage, and analysis across multiple platforms, using SIEM and EDR tools
  • Analyze log and telemetry data from diverse sources (e.g., firewalls, endpoint protection, IDS/IPS, application logs) to detect and respond to potential threats
  • Investigate and respond to security incidents, performing root cause analysis and supporting containment, eradication, and recovery efforts across endpoints, servers, cloud, and network environments
  • Conduct proactive threat hunting using behavioral analytics, threat intelligence, and hypothesis-driven queries to detect stealthy or novel attack techniques
  • Support the SOC's daily operational cadence, including participating in shift handoffs, reviewing detection effectiveness, and maintaining situational awareness of the global threat landscape
  • Contribute to the development and refinement of incident response processes, detection rules, and SOC playbooks
  • Collaborate with threat intelligence, engineering, and infrastructure teams to develop detection use cases and improve overall SOC effectiveness
  • Help shape SOC dashboards, reports, and playbooks that enhance visibility and response across business units and geographies
What we offer
What we offer
  • Discretionary bonus
  • Provident fund contributions
  • 1+5 medical insurance + top up options and access to Practo online Doctor consultation App
  • Employee assistance program
  • 3X CTC Life Assurance
  • 3X CTC Personal accident insurance
  • childcare services
  • 20 days holiday + statutory holidays
  • Gym reimbursement up to INR1150 per month
  • wellbeing program with the chance to earn up to $93 per annum
Read More
Arrow Right

SOC Operations Manager

This is an exceptional opportunity to lead, shape, and elevate a Security Operat...
Location
Location
United Kingdom , Hemel Hempstead
Salary
Salary:
80000.00 - 90000.00 GBP / Year
thepeoplenetwork.co.uk Logo
Fynity
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Proven experience leading SOC operations in a 24×7 or multi-client environment
  • Strong background in incident management, threat detection, and escalation processes
  • Technical depth across SIEM/SOAR tooling, preferably Splunk or Microsoft Sentinel
  • A passion for developing teams — coaching analysts and building collaborative, high-performing cultures
  • Strong understanding of frameworks and standards such as NIST, MITRE ATT&CK, ISO 27001, CREST, and ITIL
  • Excellent communication skills, with the ability to translate technical risks into clear business impacts
  • Security Clearance – Willing and Able to go through the DV process
  • Have held budgetary responsibility
Job Responsibility
Job Responsibility
  • Lead and develop a skilled SOC team, inspiring a culture of continuous learning and technical excellence
  • Oversee the full lifecycle of security incidents — from detection through to resolution and review
  • Manage and optimise SIEM and SOAR platforms (Splunk, Sentinel, Elastic) to enhance detection and automation capabilities
  • Drive continuous improvement through ITIL-aligned processes and adherence to CREST standards
  • Oversee vulnerability management, threat intelligence, and incident response plans
  • Communicate security posture, risks, and incident outcomes clearly to senior stakeholders
  • Ensure operational readiness and contribute to maintaining industry accreditations
  • Fulltime
Read More
Arrow Right

Managed Cloud Detection and Response Analyst

Wiz is looking for a Managed Cloud Detection and Response Analyst to join our ne...
Location
Location
Israel , Tel Aviv
Salary
Salary:
Not provided
wiz.io Logo
Wiz
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 2+ years of experience in a Security Operations Center or Managed Detection and Response, specifically involving cloud environments
  • Solid knowledge in Cloud Security, with familiarity in cloud services, Kubernetes, cloud architecture, and major providers (AWS, GCP, Azure)
  • Strong analytical skills with a detail-oriented mindset, capable of assessing complex security incidents, separating false positives from true compromise, and providing actionable insights
  • Passion for continuous learning and improvement, staying up-to-date on the latest trends, threats, and best practices in cloud security
  • Excellent communication skills verbal and written both in Hebrew and English
Job Responsibility
Job Responsibility
  • Continuously monitor customers’ cloud environments and workloads for security alerts and analyze potential cyber threats to identify and prioritize cyber security incidents
  • Triage prioritized cyber incidents and coordinate appropriate response actions to mitigate risks effectively
  • Work closely with customer teams to guide and assist with investigation and remediation of incidents
  • Create and deliver incident reports that document findings and response actions taken for customers
  • Write and implement custom detection rules and fine-tune alerts to enhance threat detection capabilities for the customer’s specific cloud environment
  • Develop and maintain cyber incident response playbooks to standardize procedures and enhance the internal methodology of the team
  • Stay up to date with the latest threats, vulnerabilities, and trends in cloud security to update response strategies and improve detection methods
Read More
Arrow Right