Search by job, company or skills

People Prime Worldwide

Security Operations Center Analyst

new job description bg glownew job description bg glownew job description bg svg
  • Posted 6 hours ago
  • Be among the first 10 applicants
Early Applicant

Job Description

About Client:

Our Client is a global IT services company headquartered in Southborough, Massachusetts, USA. Founded in 1996, with a revenue of $1.8B, with 35,000+ associates worldwide, specializes in digital engineering, and IT services company helping clients modernize their technology infrastructure, adopt cloud and AI solutions, and accelerate innovation. It partners with major firms in banking, healthcare, telecom, and media.

Our Client is known for combining deep industry expertise with agile development practices, enabling scalable and cost-effective digital transformation. The company operates in over 50 locations across more than 25 countries, has delivery centers in Asia, Europe, and North America and is backed by Baring Private Equity Asia.

Job Title: SOC Analyst Level 1 (L1)

Key Skills: SOC Analyst (L1), Security Monitoring, SIEM, Alert Analysis, Incident Triage, Threat Intelligence, Rule Tuning, Incident Response Procedures, Security Operations, Shift Handover / SOC Operations

Job Locations: Noida

Experience: 1 3 Years

Budget: 4LPA

Mode of Work: Work from Office

Rotational Shifts: Yes

Education Qualification: Any Graduation

Job Description:

The Level 1 SOC Analyst is responsible for monitoring security alerts, performing initial analysis, documenting incidents, and escalating security events according to defined procedures. The role supports SOC operations, metrics tracking, and continuous improvement activities.

Key Responsibilities

  • Monitor and triage security alerts using SIEM and security tools.
  • Escalate incidents based on established response procedures.
  • Participate in rule tuning, use case, and response procedure workshops.
  • Attend shift meetings and perform shift handover/turnover.
  • Record key SOC metrics including response time, handle time, and quality.
  • Review threat intelligence briefs and apply insights during analysis.
  • Maintain incident documentation and case notes.
  • Participate in training, lessons learned, and skills development activities.

Requirements

  • Basic knowledge of cybersecurity concepts and incident response.
  • Familiarity with SIEM tools and security monitoring.
  • Good analytical, communication, and documentation skills.
  • Ability to work in a 24x7 shift environment.

Interested Candidates please share your CV to [Confidential Information]

More Info

Job Type:
Industry:
Function:
Employment Type:

Job ID: 136405263