About Us
At LinearStack, we are building one of the most innovative cybersecurity service operations in the region. Our India operations play a vital role in delivering 24x7 monitoring and support across mission-critical infrastructure and security systems. This is your opportunity to be part of a forward-thinking team focused on operational excellence, learning, and customer-first values. We deliver tailored security solutions to reduce cyber risks, strengthen security postures, and ensure regulatory compliance. Our commitment to exceptional service and expert solutions has earned us a distinguished reputation among our clients and peers.
About the Role
We are looking for highly-motivated and dependable SOC Analyst to join our on-site team in Chandigarh–Mohali. This position provides 24x7 cybersecurity monitoring services. You will be working 5 days a week on a rotational shift basis. This role includes performing real-time cyber threat intelligence analysis, correlating actionable security events, performing network traffic analysis using raw packet data, and participating in the coordination of resources during the incident response process. As part of a rostered shift, you will be responsible for monitoring and managing both NOC (Network Operations Centre) and SOC (Security Operations Centre) support queues ensuring timely responses, accurate escalation, and clear communication. This role involves proactive threat hunting, analyzing cyber threat intelligence, and contributing to overall organizational cybersecurity efforts.
Key Responsibilities
- Monitor networks, systems, and security alerts using various NOC and SOC platforms.
- Respond to and triage incidents raised in the support queue (network/system/security-related).
- Perform initial investigation and analysis of events to determine severity and priority.
- Escalate incidents according to predefined workflows and procedures.
- Conduct basic troubleshooting on infrastructure or endpoint issues before escalation.
- Maintain accurate and detailed incident documentation in the ticketing system.
- Run scheduled infrastructure and security health checks and log observations.
- Coordinate with internal and external stakeholders during incident resolution.
- Follow shift handover procedures to ensure continuity.
- Participate in the 24x7 rotating roster (including nights, weekends, and holidays).
Requirements
- Bachelor/ Master degree or prior relevant experience; additional work experience or Cyber courses/certifications may be substituted in lieu of degree.
- Have or working towards any one of the following security certifications such as CompTIA Security+, GCIH, GSEC, GCDA, GMON, GOSI, GCIA, SSCP or CISSP.
- PowerShell or Unix/Linux command line experience (preferable).
- Scripting and programming experience (preferable).
- Motivated self-starter with strong written and verbal communication skills, and the ability to create complex technical reports on analytic findings.
- Familiarity or experience in Intelligence Driven Defense, Cyber Kill Chain methodology, and/or MITRE ATT&CK framework.
- Clear written and verbal communication skills.
- Excellent problem-solving and team collaboration abilities.
- Willingness to work on-site and in a rotating 24x7 shift pattern.
What We Offer
- Hands-on exposure to both network and security operations.
- Clear career growth path with mentorship and learning support.
- Opportunity to work with cutting-edge cybersecurity and infrastructure technologies.
- A supportive team culture focused on professional development.