Search by job, company or skills

TerraPay

Security Analyst

new job description bg glownew job description bg glownew job description bg svg
  • Posted 12 hours ago
  • Be among the first 10 applicants
Early Applicant

Job Description

SOC Analyst / Cybersecurity Analyst

Location: Bengaluru

Role overview:

We are seeking a highly motivated and detail-oriented SOC Analyst (Level 1 / Level 2) to join our Cyber Security Operations team. The ideal candidate will be responsible for real-time security monitoring, threat detection, incident response, vulnerability management, and compliance support across enterprise and cloud environments. This role demands strong analytical skills, hands-on security operations experience, and the ability to work effectively in 247 SOC

operations.

How you will create impact:

Key Responsibilities

1. Security Monitoring & Alert Management

Perform 247 real-time monitoring of security alerts and events across multiple security platforms.

Handle and triage security incidents & alerts, ensuring timely investigation and resolution.

Continuously monitor applications, servers, endpoints, databases, cloud workloads, and network infrastructure.

Identify, analyze, prioritize, and independently escalate critical security incidents based on severity and impact.

Ensure continuous health monitoring of SIEM, EDR, DLP, Email Security, and Cloud Security platforms.

2. Threat Detection & Incident Response

Investigate suspicious activities, phishing attempts, malware alerts, brute-force attacks, anomalous logins, and

lateral movement indicators.

Perform Level 1 and Level 2 incident response, including containment, eradication, recovery, and post-incident

analysis.

Execute real-time containment actions such as account isolation, endpoint quarantine, IP blocking, and session

termination.

Conduct root cause analysis (RCA) and recommend corrective and preventive actions.

Maintain complete documentation of incidents, evidence, response actions, and resolution.

3. Email Security & Phishing Response

Monitor and respond to email security alerts generated from Enterprise security platforms.

Perform phishing investigation, header analysis, URL detonation, malware sandboxing, and IOC extraction.

Execute remediation steps including mailbox purge, domain blocking, sender blacklisting, and user awareness

notifications.

Support phishing simulation exercises and employee awareness programs.

4. Vulnerability & Compliance Management

Manage vulnerability alerts across servers, applications, endpoints, network devices, containers, and cloud

workloads.

Coordinate remediation activities with DevOps, application teams, infrastructure teams, and system owners.

Track vulnerability closure through ticketing systems and compliance dashboards.

Support regulatory and compliance initiatives relevant to FinTech environments including PCI DSS, ISO 27001,

SOC 2, GDPR, RBI, and data protection regulations.

Assist in internal audits, external audits, and compliance evidence preparation.

5. System & Network Security Analysis

Analyze Windows and Linux system logs, event logs, syslogs, authentication logs, and audit trails.

Investigate endpoint and server behavioral anomalies.

Troubleshoot network security events related to:

TCP/IP, DNS, HTTP/HTTPS

VPN, routing, switching, proxies, and firewall logs

Perform packet analysis and traffic correlation during investigations.

6. Red Team Awareness & Security Testing (Basic)

Understand attack techniques such as: Port scanning, enumeration, exploitation attempts, Privilege escalation,

persistence, lateral movement

Assist blue team in improving detection logic, SIEM correlation rules, and SOC playbooks based on simulated

attacks.

Support vulnerability validation and post-remediation verification.

7. Reporting, Documentation & SOC Process Improvement

Provide management dashboards and KPIs on: Incident trends, Alert volumes, SLA compliance, Risk exposure etc

Support continuous improvement initiatives in SOC processes and workflows.

Essential qualifications:

Bachelor's degree in Computer Science, Information Security, Cybersecurity, or related field.

25 years of hands-on experience in SOC operations, incident response, or cybersecurity monitoring.

Strong understanding of: Cyber attack vectors & Incident lifecycle, MITRE ATT&CK framework

Hands-on experience with SIEM platforms (Wazuh preferred) and EDR/XDR tools.

Practical knowledge of:

Email security and phishing analysis, Malware investigation, Log correlation and forensic analysis, Solid understanding

of cloud security (AWS and Microsoft 365). Working knowledge of network security concepts, firewalls, WAF, IDS/IPS.

Nice to have:

CompTIA Security+

CEH (Certified Ethical Hacker)

Microsoft Security Certifications (SC-200, SC-300)

AWS Security Specialty

SIEM / EDR vendor certifications

Key Attributes

Strong analytical and troubleshooting mindset

Ability to operate independently under pressure

Excellent verbal and written communication skills

High attention to detail and investigative mindset

Strong sense of ownership and urgency

Willingness to work in 247 rotational SOC shifts

More Info

Job Type:
Industry:
Function:
Employment Type:

About Company

Job ID: 144963035

Similar Jobs