Analyst - Secops Job in Einfochips
Analyst - Secops
- Bengaluru, Bangalore Urban, Karnataka
- Not Disclosed
- Full-time
Position: Analyst - SecOps (SOC Level 2)
Job Overview:
We are looking for a skilled SOC Level 2 Analyst to join our global Cyber Operations team. This critical role ensures the security of our organization by monitoring, detecting, and responding to security incidents. The Analyst will work on a rotating 24x7 shift schedule, including night shifts. The ideal candidate will have strong experience in SOC operations, incident response, and proficiency with cybersecurity tools and technologies.
Key Responsibilities:
Threat Detection and Incident Response:
- Monitor, analyze, and respond to global security alerts using SIEM/SOAR tools.
- Perform triage and analysis with sandboxing technologies and threat intelligence platforms.
- Investigate security events, implement containment and recovery strategies, and expedite workflows with AI/ML capabilities.
- Query and correlate security data using KQL (Kusto Query Language) to identify and address threats.
- Develop and manage automated detection rules and playbooks in Microsoft Sentinel.
- Enhance endpoint protection and data security using Microsoft Defender and MS Purview Data Loss Prevention (DLP) tools.
Threat Hunting and Data Forensics:
- Perform proactive threat hunting and data forensics to identify and investigate potential threats.
- Use advanced threat intelligence platforms to refine detection strategies.
- Develop and execute SOC playbooks to improve response times and operational efficiency.
Team Collaboration and Leadership:
- Provide assistance with complex incidents and investigations.
- Collaborate with USA security escalation teams and other departments to improve the organization s overall security posture.
- Contribute to the development and refinement of SOC procedures and best practices.
Career Development:
- Opportunities for progression to roles like SOC Lead or SOC Architect.
- Access to continuous learning, certifications, and professional development resources.
- Regular performance reviews to discuss career growth and advancement.
Qualifications:
- Bachelor s degree in Computer Science, Cybersecurity, or related field (preferred).
- 3-5 years of experience as a SOC Analyst, with lead responsibilities being a plus.
- Strong proficiency in KQL (Kusto Query Language) for querying and analyzing security data.
- Hands-on experience with Microsoft Sentinel (including rule creation, playbook implementation, and workbooks).
- Proficiency in Microsoft Defender and MS Purview DLP for endpoint protection and data security.
- Certifications such as CISSP, CEH, or CompTIA Security+ are a plus.
Core Technologies and Expertise:
- Microsoft Sentinel: Expertise with SIEM, rule creation, playbooks, and workbooks.
- KQL (Kusto Query Language): Proficiency in querying and data correlation.
- Microsoft Defender: Strong knowledge of endpoint protection and threat detection.
- MS Purview DLP: Experience in data loss prevention strategies.
- Incident Response Tools: Knowledge of containment and recovery strategies.
- Vulnerability Management: Familiarity with assessments, penetration testing, and monitoring.
- Threat Intelligence Platforms: Ability to leverage and analyze threat intelligence.
- Network Security: Working knowledge of firewalls, IDS/IPS, and network security protocols.
- Data Forensics: Skilled in forensic analysis and investigation.
- SOC Playbooks: Ability to create and manage effective SOC playbooks.
Additional Skills:
- Strong understanding of incident response processes and procedures.
- Excellent analytical, problem-solving, and communication skills.
- Ability to work collaboratively within a well-managed team.
- Rotational 24x7 shift coverage.
Location:
Bangalore, India (SKAV Seethalakshmi, GESC)
Employment Type:
Full-time
Job Category:
Information Technology
Qualification : Bachelors degree in Computer Science, Cybersecurity, or related field (preferred).

