Role- SOC Analyst
Education- Any Bachelor's Degree
Experience- 1-3 years in Cybersecurity operations (SOC) preferably in financial service industry.
Basic Knowledge
• Networking protocols.
• Malware, phishing, firewalls, etc
• Windows & Linux OS • MITRE ATT&CK framework
• Cyber attacks
Tools
• Worked on any security Monitoring tools e.g., (DNIF, Splunk, Qradar)
• Ticketing tools (JIRA, ITSM, ServiceNow, etc. )
Soft Skills
• Analytical thinking
• Documentation & communication
• Willingness to work in shifts including graveyard shifts.
Shift & Work Environment
• 24/7 rotational shifts (including nights and weekends).
• Ability to work under pressure and handle multiple alerts simultaneously.
Key Responsibilities
• Monitor Security Alerts: Continuously monitor SIEM dashboards and other security tools for suspicious activity.
• Alert Triage: Validate alerts, classify severity, and determine if escalation is required.
• Initial Investigation: Perform basic analysis of logs, network traffic, and endpoint data to identify potential threats.
• Escalation: Forward confirmed incidents to Level 2 analysts or Incident Response team as per SLA.
• Documentation: Maintain accurate records of alerts, investigations, and escalations in ticketing systems.
• Follow Runbooks: Execute predefined playbooks for common alerts and incidents.
• Stay Updated: Keep abreast of emerging threats and security best practices.
• Health check of SIEM tool and inventory.
• Participate in cyber drill activity.
• Coordinate with the respective team to ensure closure of alerts,and take daily follow ups until all tickets are closed.
• Advisory tracking and action follow ups.
`Desired Certifications
• CompTIA Security+
• Certified Ethical Hacker (CEH)
• Certified SOC Analyst (CSA)