Job Summary
Experience:
2.00 - 4.00 Years
Industrial Type:
IT-Hardware & Networking
Location:
Mumbai
Functional Area:
IT Software - Network Administration / Security
Designation:
SOC Analyst
Key Skills:
SOC OR Security Operation OR Security Operations OR SecurityOperation OR SecurityOperations OR Security-Operation OR Security-Operations
Educational Level:
Graduate/Bachelors
Job Post Date:
2025-08-22 16:11:13
Stream of Study:
Degree:
BCA, BE-Comp/IT, BE-Other, BSc-Comp/IT, BSc-Other, BTech-Comp/IT, BTech-Other, MCA, MCM, ME-Comp/IT, ME-Other, MSc-Comp/IT, MSc-Other, MTech-Comp/IT, MTech-Other
Company Description
Our Company is the latest addition as an IT outsourcing provider for Group Worldwide. Supported by Companies Group, an 18 billion Euro organization operating in over 25 countries, company aims to offer technology services to the group. In the near future, Our company will drive its digital ambitions and establish offshore development centres in various cities across the country. Our Company will also focus on developing expertise and offering career opportunities in a wide range of technologies within the insurance sector.
Job Description
Role: SOC Analyst
Exp: 2 to 4 Years
Job Location: Mumbai (Powai - Hiranandani)
It is 5 Days Working & Work From Office Role
Core duties and responsibilities:
• Security Monitoring: Continuously monitor security alerts, logs, and other data sources using tools like SIEM (Security Information and Event Management) systems, IDS/IPS, firewalls, and endpoint security solutions to detect suspicious activities.
• Incident Detection and Response: Identify and categorize security incidents (e.g., malware infections, data breaches), investigate their root cause, contain the threat (e.g., isolating affected systems), and mitigate the impact.
• Alert Triage: Assess alerts generated by security tools, prioritizing them based on severity and urgency to focus on the most critical threats.
• Threat Hunting: Proactively search for potential security threats that may evade automated tools, analyzing logs, traffic patterns, and other data for anomalies.
• Reporting and Documentation: Create detailed reports on security incidents, investigations, and response actions for management and other stakeholders, ensuring compliance with relevant regulations.
• Security Tool Management: Manage and operate security technologies, ensuring they are updated and functioning correctly.
• Threat Intelligence: Stay updated on the latest cybersecurity threats, vulnerabilities, and attack techniques through threat intelligence sources and research.
• Collaboration: Work closely with other security professionals (e.g., incident responders, threat hunters) and IT teams to investigate and resolve security issues.
