Search by job, company or skills

TRIARQ Health India

SOC Analyst

4-6 Years

This job is no longer accepting applications

new job description bg glownew job description bg glownew job description bg svg
  • Posted a month ago
  • Over 50 applicants

Job Description

TRIARQ Health is a physician practice services company that partners with doctors to run modern patient-centered practices so they can be rewarded for delivering high-value care. TRIARQ's physician-led partnerships simplify practices transition to value-based care by combining our proprietary, cloud-based practice, care management platform, and patient engagement services to help doctors focus on better outcomes.

Industry Type: IT-Software, Software Services

Location: Nashik, Pune and Mumbai

Division: Healthcare Technology

Job Summary

We are seeking an experienced SOC Analyst with 45 years of hands-on experience in security monitoring, incident investigation, and vulnerability management. The ideal candidate should have strong analytical skills, excellent communication abilities, and practical experience working with modern EDR, SIEM, and cloud security tools.

Responsibilities

  • Monitor, triage, and analyze security incidents/alerts from EDR solutions (e.g., CrowdStrike).
  • Monitor phishing alerts and email threats using tools like Mimecast.
  • Perform detailed investigation and diagnosis of security incidents to determine severity and root cause.
  • Operate and manage SIEM platforms (Splunk) for log analysis, alert tuning, and dashboard creation.
  • Manage vulnerability reporting cycles (weekly, monthly, and ad hoc) using Tenable, WIZ, and Mend.
  • Produce vulnerability reports and risk summaries for technical teams and management.
  • Create dashboards and visualizations in SIEM and vulnerability platforms to track KPIs and KRIs.
  • Collaborate with cross-functional teams (IT, Cloud, Network, AppSec) for incident response and remediation.
  • Maintain documentation such as incident reports, SOPs, and playbooks.

Skill Requirements

  • 45 years of SOC or Security Operations experience.
  • Understanding of security frameworks, incident response lifecycle, and threat hunting methods.
  • Hands-on expertise with Splunk SIEM.
  • Strong experience with EDR tools (CrowdStrike preferred).
  • Preferred knowledge of Tenable, WIZ, Checkpoint, and Mimecast.
  • Ability to prepare and present reports to management.
  • Strong communication, reporting, and presentation skills.
  • Must be able to work independently in a fast-paced SOC environment.

Work experience: 4-5 years

Employment Type: Full Time, Permanent

More Info

Job Type:
Industry:
Employment Type:

About Company

Job ID: 141930703

Similar Jobs