Job Description
This is a remote position.
We are looking to onboard a freelance SOC Analyst on a project basis to support our growing Security Operations Center (SOC) initiatives. This role will be essential in helping us expand capabilities for clients across the finance, SaaS, and critical infrastructure sectors.
Please find below the project overview and candidate expectations :
Project Overview
The selected analyst will play a critical role in threat monitoring, log analysis, incident response , and real-time security event detection . This position will be project-based, with the potential for ongoing engagements depending on performance.
Key Responsibilities
Security Monitoring : Monitor alerts from Wazuh, Splunk, ELK, IDS / IPS, endpoint logs, and cloud environments.
Incident Response : Analyze and respond to alerts, perform root cause analysis, and escalate as needed.
Threat Hunting : Identify potential threats using intelligence feeds and behavioral anomalies.
Alert & Rule Tuning : Customize Wazuh / OSSEC rules to reduce false positives.
Documentation : Prepare incident reports, runbooks, and weekly summaries.
Client Support : Assist in aligning with client-specific SOC policies, and support us during client meetings for POC and SOC service delivery discussions.
Skills & Competencies
Technical Expertise
SIEM platforms : Wazuh (mandatory), ELK Stack, Splunk
OS : Linux (Debian / Ubuntu / CentOS) & Windows (Event logs)
Network : TCP / IP, DNS, ports, protocols, packet analysis
Monitoring : File / process integrity, rootkit detection
Scripting : Basic Python or Bash
Tools Stack (Preferred)
EDR : OSQuery, CrowdStrike
Network : Zeek, Suricata, Wireshark
Threat Intel : VirusTotal, AbuseIPDB, MISP, MITRE ATT&CK
Case Management : TheHive + Cortex
Minimum Qualifications
2–5 years of experience in a SOC
Proven ability to analyze security logs and events
Strong analytical and reporting skills
Proficiency in written English for documentation
Interested candidate can share the profile at Hr@petadot.com along with profile for detail discussion.
Requirements
Skills & Competencies
Technical Expertise
SIEM platforms : Wazuh (mandatory), ELK Stack, Splunk
OS : Linux (Debian / Ubuntu / CentOS) & Windows (Event logs)
Network : TCP / IP, DNS, ports, protocols, packet analysis
Monitoring : File / process integrity, rootkit detection
Scripting : Basic Python or Bash
Tools Stack (Preferred)
EDR : OSQuery, CrowdStrike
Network : Zeek, Suricata, Wireshark
Threat Intel : VirusTotal, AbuseIPDB, MISP, MITRE ATT&CK
Case Management : TheHive + Cortex
Minimum Qualifications
2–5 years of experience in a SOC
Proven ability to analyze security logs and events
Strong analytical and reporting skills
Proficiency in written English for documentation
Requirements
Skills & Competencies Technical Expertise SIEM platforms : Wazuh (mandatory), ELK Stack, Splunk OS : Linux (Debian / Ubuntu / CentOS) & Windows (Event logs) Network : TCP / IP, DNS, ports, protocols, packet analysis Monitoring : File / process integrity, rootkit detection Scripting : Basic Python or Bash Tools Stack (Preferred) EDR : OSQuery, CrowdStrike Network : Zeek, Suricata, Wireshark Threat Intel : VirusTotal, AbuseIPDB, MISP, MITRE ATT&CK Case Management : TheHive + Cortex Minimum Qualifications 2–5 years of experience in a SOC Proven ability to analyze security logs and events Strong analytical and reporting skills Proficiency in written English for documentation
Soc Analyst • Mumbai, MH, in