Search by job, company or skills

NBITS IT Company

SOC (Security Operations Center) Analyst

new job description bg glownew job description bg glownew job description bg svg
  • Posted 3 hours ago
  • Be among the first 10 applicants
Early Applicant

Job Description


JD for Security Operations Center (SOC) Analyst

Introduction:

NBITS (N Benchmark IT Solutions) is an IT Company which has key services into Consulting, Development and Outsourcing across wide variety of tools & technologies (primarily Microsoft, Oracle, SAP, AI, Bigdata, Integration, App Building, Cloud & Analytics).

Looking for Passionate & Dynamic professionals who can be in sync with Organization Goals & Vision and can be committed for significant value addition and proudly be part of Organization's Exponential growth.

Key Details of the Job:

Position : Security Operations Center (SOC) Analyst

Designation: Security Operations Center (SOC) Analyst

Experience: 6 - 8 Years

Location: Remote

Timings: 2 PM 11 PM IST

Job Type: Contractor

Start Date: ASAP (Immediate Joiners are preferable)

Primary Skills : Well versed with SOC, SIEM, EDR/XDR, Triage, containment, MITRE ATT&CK, Azure Sentinel/Defender, AWS GuardDuty/CloudWatch, IDS/IPS, DLP, IAM, vulnerability management, Automation & Scripting(Python, PowerShell, Bash, SOAR), NIST CSF, SOC best practices, Alert escalation, incident management, 24/7 monitoring.

Brief About the Role

We are seeking a Security Operations Center (SOC) Analyst to global cybersecurity team. In this role, you will be a key player in protecting a leading accounting and advisory firm, ensuring the security of our systems and client data across audit, tax, and advisory services.

You will lead advanced threat detection and incident response efforts, help maintain compliance with financial regulations and uphold our firm's standards of professional excellence and integrity. The ideal candidate is an experienced security analyst collaborate across departments (IT, Internal Audit, Compliance, etc.) and drive continuous improvements in our SOC processes and defenses.

Required Qualifications

Education & Experience: Bachelor's degree in Cybersecurity, Computer Science, Information Systems, or related field (or equivalent experience). 2+ years in information security, including 2+ years as a SOC analyst handling incident detection and response.

Technical Expertise: Hands-on experience with SIEM and EDR tools, analyzing logs and alerts from network devices, servers, and cloud services to detect security incidents.

Cloud Security Knowledge: Strong understanding of Azure and/or AWS security monitoring, using tools like Azure Security Center/Sentinel, AWS CloudWatch, and GuardDuty for threat detection.

Incident Response Skills: Experience managing incident response end-to-end (triage, investigation, containment, recovery, root cause analysis). Knowledge of digital forensics and evidence handling.

Programming / Automation: Experience with Python, PowerShell, or Bash for SOC automation. Familiarity with SOAR platforms, playbooks, and automated workflows.

Frameworks & Methodologies: Knowledge of MITRE ATT&CK and NIST Cybersecurity Framework for security operations and threat analysis.

Leadership & Communication: Strong communication skills to document incidents and present findings to technical and non-technical stakeholders.

Preferred Qualifications

Analytical Mindset: Strong problem-solving ability, capable of handling cyber incidents under pressure and making quick risk-based decisions.

Certifications: Security certifications such as CISSP or CISM.

Advanced Security Tools: Experience with IDS/IPS, DLP, IAM, and vulnerability management, including tool tuning in enterprise environments.

Cloud & DevSecOps: Knowledge of cloud security, DevSecOps, secure cloud architecture, and securing SaaS, containers, or Kubernetes environments.

Industry Experience: Experience in financial services or regulated environments, supporting cybersecurity, compliance, and client data protection.

Responsibilities
  • Monitor & Analyze Threats:Continuously monitor security events and alerts from SIEM, EDR, cloud security consoles, and other tools to identify potential incidents. Perform in-depth analysis of suspicious activity across networks, endpoints, and cloud environments, distinguishing false positives from real threats.
  • Incident Response Leadership: Act as the incident lead for high-severity or complex security incidents, coordinating containment, eradication, and recovery efforts in line with established playbooks. Conduct thorough root cause analysis and forensic investigation to determine the impact and prevent recurrence of incidents.
  • Threat Hunting & Intelligence:Proactively hunt for threats in the IT environment using threat intelligence feeds and the MITRE ATT&CK framework to uncover latent risks. Stay up-to-date with the latest attacker tactics and techniques, and adjust monitoring use cases to address emerging threats.
  • SOC Use Case Development:Develop and fine-tune detection rules, correlation logic, and alerts within our SIEM and monitoring platforms. Define and maintain SOC use cases and playbooks for incident triage and response, ensuring they align with industry best practices and EisnerAmper's risk profile.
  • SOC Operations & Escalation:Participate in day-to-day SOC operations during your shift or as needed, acting as the escalation point for junior analysts or third-party SOC. Ensure alerts are handled efficiently and escalated appropriately, maintaining a high level of vigilance across 24/7 operations.
  • Cross-Team Collaboration:Work closely with cross-functional teams including IT Infrastructure, Network Engineering, Cloud Operations, Internal Audit, and professional service lines to remediate security issues and improve protective measures. Provide security expertise in support of audits and assessments.
Soft Skills & Professional Attributes

Strong problem-solving and analytical skills

Excellent communication and collaboration skills

Ability to work independently in a remote/distributed team

Ability to work in agile, fastpaced cloud projects

Proactive attitude with ownership and accountability

NOTE:

Preference will be given for the people who are proactive, showcase right attitude, submit all the required on boarding documents in time and willing to start working immediately.

Resume should be in detail by project wise(Word Format only) and SYNC with above Job Description else it will be rejected at scrutiny level itself. Hence prepare the resume properly & fill the contact form without fail and share with us.

https://forms.gle/S3FpLin84gpuq9iBA

If you are suitable & interested, please share your updated profile to [Confidential Information]

Else Share in your network and help us to get the best suitable resources.

Thank You

NBITS Team

www.nbits.tech

#SecurityOperationsCenterAnalyst #SOCAnalyst#hiring #immediatehiring #urgentrequirement #remote #nbits #datatiks #hyderabadjobs #bangalorejobs #indiajobs

More Info

Job Type:
Industry:
Function:
Employment Type:

About Company

Job ID: 144386807