This position is posted by Jobgether on behalf of a partner company. We are currently looking for a Security Operations Analyst in India.
This role offers an exciting opportunity to contribute to a modern and intelligence-driven cybersecurity environment focused on protecting enterprise-scale systems and sensitive data.
You will play a key role in monitoring, investigating, and responding to security events across cloud, endpoint, identity, and network environments.
The position combines hands-on security operations work with threat detection, incident triage, and operational process improvement in a highly collaborative setting.
You will work closely with security teams to strengthen detection capabilities, improve response workflows, and support ongoing security operations initiatives.
The role also provides strong exposure to SIEM platforms, endpoint detection technologies, cloud security, and threat intelligence operations.
Ideal for security professionals passionate about incident response and cyber defense, this opportunity offers meaningful impact within a fast-paced and technology-driven environment
Accountabilities:
- Monitor, analyze, and triage security alerts across SIEM, endpoint detection, cloud security, and identity management platforms.
- Perform initial investigations into suspicious activities by collecting, correlating, and analyzing logs and security telemetry from multiple sources.
- Execute containment and remediation actions within established escalation procedures and operational guidelines.
- Maintain accurate incident documentation, investigation records, and escalation summaries within security tracking systems.
- Contribute to detection engineering efforts, including rule tuning and development for threat detection platforms.
- Support maintenance and optimization of endpoint detection and prevention policies.
- Review threat intelligence feeds, correlate indicators of compromise (IOCs), and identify potential risks within internal environments.
- Investigate cloud and identity-related security anomalies, including suspicious login behavior and MFA bypass attempts.
- Support cloud incident response activities and contribute to identifying detection gaps and operational improvements.
- Develop and maintain SOC runbooks, triage procedures, and knowledge-sharing documentation to support operational consistency.
Requirements:
- 2–4 years of experience in security operations, incident response, or SOC environments.
- Bachelor’s degree in Technology, Computer Science, Cybersecurity, or a related field from a recognized institution.
- Hands-on experience with SIEM platforms such as Chronicle, Splunk, Sentinel, or equivalent technologies.
- Familiarity with endpoint detection and response tools, preferably CrowdStrike Falcon.
- Foundational understanding of cloud security concepts across platforms such as Amazon Web Services or Google Cloud.
- Knowledge of identity-related attack patterns, including credential stuffing, MFA fatigue, and account takeover techniques.
- Ability to interpret and analyze authentication, endpoint, network, and cloud audit logs effectively.
- Strong written communication skills with the ability to document incidents and escalation summaries clearly and concisely.
- Familiarity with threat intelligence, detection engineering, and cloud security posture management concepts is a plus.
- Basic scripting or automation experience using Python or similar technologies is preferred.
- Relevant cybersecurity certifications such as CompTIA Security+, CySA+, GCIH, or GCIA are advantageous.
Benefits:
- Opportunity to work within a highly advanced and AI-driven cybersecurity environment.
- Exposure to enterprise-scale cloud, endpoint, and threat intelligence operations.
- Collaborative and globally distributed work culture focused on innovation and security excellence.
- Career development opportunities with access to modern security technologies and industry best practices.
- Inclusive workplace environment that values diversity, collaboration, and professional growth.
- Ongoing learning opportunities through exposure to incident response, detection engineering, and cloud security operations.
- Dynamic and fast-paced environment where security professionals can make a meaningful impact.
How Jobgether works:
We use an AI-powered matching process to ensure your application is reviewed quickly, objectively, and fairly against the role's core requirements. Our system identifies the top-fitting candidates, and this shortlist is then shared directly with the hiring company. The final decision and next steps (interviews, assessments) are managed by their internal team.
We appreciate your interest and wish you the best!
Data Privacy Notice: By submitting your application, you acknowledge that Jobgether will process your personal data to evaluate your candidacy and share relevant information with the hiring employer. This processing is based on legitimate interest and pre-contractual measures under applicable data protection laws (including GDPR). You may exercise your rights (access, rectification, erasure, objection) at any time.
#LI-CL1