CrawlJobs Logo

SOC Analyst

nttdata.com Logo

NTT DATA

Location Icon

Location:
India , New Delhi

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

The Security Managed Services Engineer (L1) is an entry level engineering role, responsible for providing a managed service to clients to ensure that their Firewall infrastructure remain operational through proactively identifying, investigating, and routing the incidents to correct resolver group. The primary objective of this role is to ensure zero missed service level agreement (SLA) conditions and focuses on first-line support for standard and low complexity incidents and service requests.

Job Responsibility:

  • Monitors client infrastructure and solutions
  • Identifies problems and errors prior to or when they occur
  • Routinely identifies common incidents and opportunities for avoidance as well as general opportunities for incident reduction
  • Investigates first line incidents assigned and identifies the root cause of incidents and problems
  • Provides telephonic or chat support to clients when required
  • Schedules maintenance activity windows for patching and configuration changes
  • Follows the required handover procedures for shift changes to ensure service continuity
  • Reports and escalates incidents where necessary
  • Ensures the efficient and comprehensive resolutions of incidents and requests
  • Updates existing knowledge articles or create new ones
  • Identifies opportunities for work optimization including opportunities for automation of work, request fulfilment, incident resolution, and other general process improvement opportunities
  • May also contribute to / support on project work as and when required
  • May work on implementing and delivering Disaster Recovery functions and tests

Requirements:

  • BE/BTech in Electronics/EC/EE/CS/IT Engineering
  • At least one security certification such as CCNA Security, CCSA, CEH, CompTIA
  • Minimum 2 years of experience in handling security related products & services and preferably SIEM solution
  • Adequate knowledge of security devices like firewalls, IPS, Web Application Firewall, DDOS, EDR, Incident response, SOAR and other security devices
  • Knowledge of packet level analysis
  • Knowledge of networking protocols and technologies and network security
  • Sound analytical and troubleshooting skills

Additional Information:

Job Posted:
January 26, 2026

Employment Type:
Fulltime
Work Type:
On-site work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for SOC Analyst

L2 SOC Analyst

Quzara, a leading Cyber Security Firm, is seeking a highly skilled and experienc...
Location
Location
United States
Salary
Salary:
Not provided
quzara.com Logo
Quzara
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • At least 5+ years of experience in a SOC Analyst role at a SOC/MXDR or MSSP with L2 experience
  • Strong understanding of networking technologies
  • Experience with Microsoft security technologies such as Microsoft Sentinel and M365 Defender
  • Strong understanding of security best practices and incident response procedures
  • Experience with deep threat intelligence
  • Strong proficiency with KQL Queries
  • Strong verbal and written communication skills
  • Strong analytical and problem-solving skills
  • Azure experience working with azure security is a must
  • Experience with scripting languages such as Python, PowerShell, and JavaScript
Job Responsibility
Job Responsibility
  • Monitor and analyze security events utilizing advanced security technologies and tools such as Microsoft Sentinel, Defender technologies, and Log Analytics
  • Utilize deep threat intelligence to identify and investigate potential security threats
  • Respond to and triage security incidents, escalating as necessary
  • Utilize proficiency in KQL Queries to conduct investigations and gain insights into potential security threats
  • Collaborate with other teams to resolve security incidents and improve overall security posture
  • Participate in incident response efforts and assist in forensic investigations, adhering to NIST guidelines
  • Continuously improve security operations through the identification of trends and anomalies
  • Communicate security incidents and findings to stakeholders and management
  • Fulltime
Read More
Arrow Right

SOC Analyst

We are seeking a SOC Analyst to strengthen its cybersecurity operations. This ro...
Location
Location
United States , Jersey City
Salary
Salary:
Not provided
https://www.roberthalf.com Logo
Robert Half
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Experience with SIEM tools (Sentinel, AlienVault) and EDR solutions (CrowdStrike, SentinelOne)
  • Strong knowledge of cloud security (AWS, Azure) and DevSecOps tools (Jenkins, GitHub, Kubernetes)
  • Proficiency in network protocols (TCP/IP, DNS, HTTP) and IAM solutions (Okta, Azure AD)
  • Hands-on experience with vulnerability management tools (Nessus, Metasploit)
  • Understanding of compliance frameworks (GDPR, HIPAA, PCI DSS)
  • Strong analytical and problem-solving abilities
  • Excellent communication skills with cross-functional teams
  • Proactive, detail-oriented, and thrives in a fast-paced environment
  • Bachelor's degree in Cybersecurity, IT, or a related field, or equivalent experience
  • 3+ years in SOC/security operations
Job Responsibility
Job Responsibility
  • Monitoring & Incident Response – Analyze security logs, investigate alerts, contain threats, and collaborate with MTDR vendors on SIEM configuration
  • Threat Intelligence & Hunting – Leverage threat intelligence feeds, proactively hunt for security risks, and apply MITRE ATT&CK methodologies
  • Network & Endpoint Security – Secure firewalls, IDS/IPS, VPNs, and manage EDR solutions to protect enterprise assets
  • Cloud & Application Security – Conduct security assessments, enforce best practices in AWS, Azure, and Google Cloud, and automate security measures within CI/CD pipelines
  • IAM & Data Security – Monitor identity and access management (IAM) systems, detect unauthorized access, and implement encryption and DLP policies
  • Compliance & Risk Management – Support audits for GDPR, HIPAA, and NIST compliance while performing internal security checks
  • Reporting & Communication – Generate detailed reports, collaborate with IT, development, and management teams, and contribute to security awareness initiatives
What we offer
What we offer
  • medical, vision, dental, and life and disability insurance
  • eligible to enroll in our company 401(k) plan
  • Fulltime
Read More
Arrow Right

SOC Analyst – Intermediate

Under the general direction of the management team and senior staff, Security Op...
Location
Location
United States
Salary
Salary:
Not provided
revelit.com Logo
Revel IT
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Typically has a 4-year academic degree and 2+ years of information security or equivalent practical work experience
  • Demonstrates and applies thorough understanding of information technology tools, best practices, and concepts
  • Completes on-going training on-the-job, through courses, self-study, certifications and/or advanced degrees to maintain and enhance technical and business capabilities
  • Maintains current knowledge of security techniques and technologies and applies that knowledge to mitigate risk
  • Participates in an On-Call Team rotation
  • Previous experience with some of the following security technologies: Security information and event management (SIEM), Endpoint Detection and Response (EDR), Anti-Virus, IDS/IPS, and NGFW solutions
  • Knowledge of tactics attackers are using while continuing to monitor for new tactics and procedures being utilized
Job Responsibility
Job Responsibility
  • Provide service to IT client community, patients, families and visitors, while protecting the integrity and confidentiality of all data and information through physical and electronic measures
  • Monitor and investigate security alerts to detect malicious activity that originate from the SIEM, NGFW, EDR, NGAV, etc
  • Follow incident specific playbooks and procedures documented by SOC leadership while investigating and responding to malicious activity
  • Maintain accurate notes in the case management system
  • Proactively identify and remediate threats occurring in the environment by demonstrating the ability to hunt in SIEM and EDR solutions
  • Provide on-call support at designated times in accordance with the policies and procedures of the Health System
  • Collaborate with the team and answer any questions that other analysts may have
  • Assist in the training of new team members
  • Assist in investigating alerts escalated by associate level staff members
  • Work independently to investigate security incidents and alerts
  • Fulltime
Read More
Arrow Right

Cyber Security Soc Analyst

The SOC Analyst (L1/L2) and Lead are responsible for proactive monitoring, detec...
Location
Location
India , Chennai
Salary
Salary:
Not provided
https://www.soprasteria.com Logo
Sopra Steria
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Strong knowledge of SIEM platforms and alert investigation
  • Advanced incident response, malware analysis, and RCA expertise
  • Deep knowledge of endpoint and network security tools
  • Threat hunting and forensic investigation capabilities
  • Familiarity with vulnerability management and DLP/email security
  • Experience with threat intelligence platforms and TTP mapping
  • Strong analytical, communication, and documentation skills
  • Guide development of SOC procedures/runbooks and continuous improvement initiatives
  • Administer DLP and email security systems
  • Operate Microsoft Defender for Endpoint, conduct threat hunting via EDR telemetry and memory dumps
Job Responsibility
Job Responsibility
  • Proactive monitoring, detection, investigation, and response to security threats using industry-leading solutions
  • Guide and architect SOC workflows and systems to ensure robust organizational security
  • Threat hunting and forensic investigation
  • Administer DLP and email security systems
  • Operate Microsoft Defender for Endpoint, conduct threat hunting via EDR telemetry and memory dumps
  • Use, configure, and optimize SIEM tools (Splunk, IBM QRadar, Microsoft Sentinel, LogRhythm, ArcSight, Elastic SIEM) for threat identification and alert management
  • Guide development of SOC procedures/runbooks and continuous improvement initiatives
  • Leadership and team management
What we offer
What we offer
  • Inclusive and respectful work environment
  • Positions open to people with disabilities
  • Fulltime
Read More
Arrow Right

SOC Level 1 Analyst

Inetum is a European leader in digital services. Inetum’s team of 28,000 consult...
Location
Location
Portugal , Lisbon
Salary
Salary:
Not provided
https://www.inetum.com Logo
Inetum
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 1/2 years of experience as a SOC level 1 analyst or similar
  • Experience with MS Windows Azure
  • Strong knowledge of IP networks - Internet Protocol (IPv4, IPv6)
  • Familiarity with DNS - Domain Name System
  • Knowledge of Sentinel is valuable
  • Analytical mindset and attention to detail
  • Enjoy working in a team, proactivity, and results orientation
  • Good level of English
  • Availability to work 24x7 shifts
Job Responsibility
Job Responsibility
  • Monitoring the SIEM platform and other systems that generate vulnerability alerts and security incident events
  • Periodic verification of sources that need to be managed and analysis of security events
  • Identification and notification of security alerts
  • Recording security incidents
  • Performing the first level of incident handling (assessment, triage, identification of actions to be taken, escalation, validation)
  • Verification of effective incident resolution
  • Fulltime
Read More
Arrow Right

Incident Response and SOC Analyst

The role supports the Cyber Security Operations Centre for the EU critical infra...
Location
Location
Belgium , Brussels
Salary
Salary:
Not provided
https://www.soprasteria.com Logo
Sopra Steria
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Strong incident response methodology and hands-on experience in end-to-end incident handling in multinational settings
  • Advanced knowledge of XSOAR playbook creation and automation
  • Proficiency in designing and adapting automated workflows and enrichment
  • Python programming skills
  • Ability to present technical and business information effectively to diverse EC stakeholders
  • High standards for incident documentation, KPI reporting, and compliance with security frameworks
  • Familiarity with cloud-native services (AWS, Azure), EDR, SIEM-SOAR platforms, and container security
  • Excellent communication skills for working in multicultural teams and liaising with technical and non-technical audiences
  • Certifications or experience in relevant security technologies (e.g., Palo Alto Cortex XSOAR, Splunk, Microsoft SC-200, AWS Security Specialty)
  • Level 6 European Qualification Framework (Bachelor's degree or higher) for senior profiles
Job Responsibility
Job Responsibility
  • Define incident handling procedures, automation requirements, and playbook logic aligned with the needs
  • Prepare incident response workflows, automated enrichment steps, and technical documentation for standardized alert handling
  • Handle cybersecurity incidents from detection through escalation, containment, and resolution
  • Develop and maintain XSOAR playbooks, integrations, and automations across platforms such as Splunk, AWS, Azure Sentinel, Carbon Black Cloud, and Sysdig
  • Coordinate and review playbook updates, incident reports, and cross-team collaboration
  • Report key performance metrics, including FPTP rate, MTTH, escalation rate, automation coverage, time saved, and error reductions
  • Assist training analysts on playbook usage and incident response methods
  • Collaborate with CSIRC, CATCH analysts, infrastructure teams, and external stakeholders to validate playbook coverage and share threat intelligence.
What we offer
What we offer
  • Mobility options (including a company car)
  • Insurance coverage
  • Meal vouchers
  • Eco-cheques
  • Continuous learning opportunities through the Sopra Steria Academy
  • Participation in team events.
  • Fulltime
Read More
Arrow Right

SOC Cyber Fraud Analyst

The Security Operations Center Cyber Fraud Analyst is an intermediate level posi...
Location
Location
Singapore , Singapore
Salary
Salary:
Not provided
https://www.citi.com/ Logo
Citi
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 3-5 years of relevant experience in Cyber Fraud or SOC
  • Ability to communicate effectively both orally and in writing
  • Strong knowledge of current Cyber Fraud trends including common Account Takeover techniques and banking malware
  • Deep understanding of Intrusion Detection analysis (TCP/IP, packet level analysis) as well as Application Layer Protocols (HTTP)
  • Advanced understanding of various operating systems (Windows/UNIX), and web technologies (focusing on Internet security)
  • Knowledge of cutting-edge threats and technologies affecting Web Applications
  • Consistently demonstrates clear and concise written and verbal communication
  • Proven influencing and relationship management skills
  • Proven analytical skills
  • Bachelor’s degree/University degree or equivalent experience
Job Responsibility
Job Responsibility
  • Perform monitoring, research, assessment and analysis of Digital Fraud Attacks leveraging various Security Event Monitoring platforms
  • Follow pre-defined actions to handle BAU and high severity issues including escalating to other support groups
  • Execute daily ad hoc tasks or lead small projects as needed
  • Create and maintain operational reports for Key Performance Indicators and weekly and monthly metrics
  • Perform assessment as well as troubleshooting to help isolate technical issues with the integration of fraud monitoring technologies
  • Participate in daily and ad hoc conference calls to manage quality assurance and documentation related tasks
  • Identify areas for tuning use cases to enhance monitoring value
  • Engage with Fraud Policy, Operations, Strategy and other teams for early detection, prevention and mitigation of detected fraudulent activities
  • Fulltime
Read More
Arrow Right

AVP - SOC Cyber Fraud Analyst

The Security Operations Center Cyber Fraud Analyst is an intermediate level posi...
Location
Location
Singapore , Singapore
Salary
Salary:
Not provided
https://www.citi.com/ Logo
Citi
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Ability to communicate effectively both orally and in writing
  • Strong knowledge of current Cyber Fraud trends including common Account Takeover techniques and banking malware
  • Deep understanding of Intrusion Detection analysis (TCP/IP, packet level analysis) as well as Application Layer Protocols (HTTP)
  • Advanced understanding of various operating systems (Windows/UNIX), and web technologies (focusing on Internet security)
  • Knowledge of cutting-edge threats and technologies affecting Web Applications
  • Experience with Big Data Technologies, ETL Tools, Data Warehouse and Business Intelligence technologies is preferred
  • Experience with any scripting language and Splunk is a plus
  • Experience with vulnerability assessment as well as penetration testing or forensic analysis fields is a plus
  • Certifications from EC-Council, GIAC, (ISC)² are preferred [CISSP, CEH, GCIA, GWAPT and CFE]
  • 5-8 years of relevant experience in Cyber Fraud or SOC
Job Responsibility
Job Responsibility
  • The analyst performs monitoring, research, assessment and analysis of Digital Fraud Attacks leveraging various Security Event Monitoring platforms including Web Threat Detection, Real Time Fraud Risk Assessment, Big Data and Digital Application Monitoring tools (Splunk, SAS, Teradata, and enterprise real time fraud detection tools)
  • Follow pre-defined actions to handle BAU and high severity issues including escalating to other support groups
  • Execute daily ad hoc tasks or lead small projects as needed
  • Create and maintain operational reports for Key Performance Indicators and weekly and monthly metrics
  • Perform assessment as well as troubleshooting to help isolate technical issues with the integration of fraud monitoring technologies
  • Participate in daily and ad hoc conference calls to manage quality assurance and documentation related tasks
  • Identify areas for tuning use cases to enhance monitoring value
  • Engage with Fraud Policy, Operations, Strategy and other teams for early detection, prevention and mitigation of detected fraudulent activities
  • Fulltime
Read More
Arrow Right