This is a remote position.
We are looking to onboard a freelance SOC Analyst on a project basis to support our growing Security Operations Center (SOC) initiatives. This role will be essential in helping us expand capabilities for clients across the finance SaaS and critical infrastructure sectors.
Please find below the project overview and candidate expectations :
Project Overview
The selected analyst will play a critical role in threat monitoring log analysis incident response and real-time security event detection . This position will be project-based with the potential for ongoing engagements depending on performance.
Key Responsibilities
Security Monitoring : Monitor alerts from Wazuh Splunk ELK IDS / IPS endpoint logs and cloud environments.
Incident Response : Analyze and respond to alerts perform root cause analysis and escalate as needed.
Threat Hunting : Identify potential threats using intelligence feeds and behavioral anomalies.
Alert & Rule Tuning : Customize Wazuh / OSSEC rules to reduce false positives.
Documentation : Prepare incident reports runbooks and weekly summaries.
Client Support : Assist in aligning with client-specific SOC policies and support us during client meetings for POC and SOC service delivery discussions.
Skills & Competencies
Technical Expertise
SIEM platforms : Wazuh (mandatory) ELK Stack Splunk
OS : Linux (Debian / Ubuntu / CentOS) & Windows (Event logs)
Network : TCP / IP DNS ports protocols packet analysis
Monitoring : File / process integrity rootkit detection
Scripting : Basic Python or Bash
Tools Stack (Preferred)
EDR : OSQuery CrowdStrike
Network : Zeek Suricata Wireshark
Threat Intel : VirusTotal AbuseIPDB MISP MITRE ATT&CK
Case Management : TheHive Cortex
Minimum Qualifications
2 5 years of experience in a SOC
Proven ability to analyze security logs and events
Strong analytical and reporting skills
Proficiency in written English for documentation
Interested candidate can share the profile at along with profile for detail discussion.
Requirements
Skills & Competencies
Technical Expertise
SIEM platforms : Wazuh (mandatory) ELK Stack Splunk
OS : Linux (Debian / Ubuntu / CentOS) & Windows (Event logs)
Network : TCP / IP DNS ports protocols packet analysis
Monitoring : File / process integrity rootkit detection
Scripting : Basic Python or Bash
Tools Stack (Preferred)
EDR : OSQuery CrowdStrike
Network : Zeek Suricata Wireshark
Threat Intel : VirusTotal AbuseIPDB MISP MITRE ATT&CK
Case Management : TheHive Cortex
Minimum Qualifications
2 5 years of experience in a SOC
Proven ability to analyze security logs and events
Strong analytical and reporting skills
Proficiency in written English for documentation
Skills & Competencies Technical Expertise SIEM platforms : Wazuh (mandatory), ELK Stack, Splunk OS : Linux (Debian / Ubuntu / CentOS) & Windows (Event logs) Network : TCP / IP, DNS, ports, protocols, packet analysis Monitoring : File / process integrity, rootkit detection Scripting : Basic Python or Bash Tools Stack (Preferred) EDR : OSQuery, CrowdStrike Network : Zeek, Suricata, Wireshark Threat Intel : VirusTotal, AbuseIPDB, MISP, MITRE ATT&CK Case Management : TheHive + Cortex Minimum Qualifications 2 5 years of experience in a SOC Proven ability to analyze security logs and events Strong analytical and reporting skills Proficiency in written English for documentation
Key Skills
English,Cathodic,Communication,Journalism,Arbitration Law
Employment Type : Full Time
Experience : years
Vacancy : 1
Soc Analyst • Mumbai, Maharashtra, India