Required Skills & Experience
7-10 years of experience in a SOC or cybersecurity operations role.
Proficiency with Google Chronicle, including rule tuning, log analysis, and case management.
Experience with SIEM tools (e.g., Splunk, QRadar, Elastic Stack) and SOAR platforms.
Strong understanding of TCP / IP, DNS, HTTP / S, and other network protocols.
Familiarity with endpoint detection tools (e.g., CrowdStrike, MS Defender), IDS / IPS, and vulnerability scanners (e.g., Nessus, Qualys).
Scripting skills in Python, Bash, or PowerShell for automation and data parsing.
Nice to Have Skills & Experience
Bachelor’s degree in Cybersecurity, Computer Science, or related field.
Certifications such as CompTIA Security+, GIAC (GCIH, GCIA), CEH, or Google Cloud Security Engineer.
Prior experience supporting federal or financial clients.
Experience with red / blue / purple team exercises and threat hunting.
Job Description
We are seeking a Security Operations Center (SOC) Analyst with hands-on experience in Google SecOps Chronicle to join our cybersecurity team. This role is critical to monitoring, analyzing, and responding to security threats across cloud and hybrid environments. The ideal candidate will be comfortable working in high-pressure situations, collaborating across teams, and leveraging Chronicle’s SIEM / SOAR capabilities to enhance threat detection and response.
Stay current on threat landscapes, compliance standards (e.g., MITRE ATT&CK, GDPR, PCI-DSS), and emerging security technologies.
This position will pay $15 / hour and is located in Hyderabad India.
Security Analyst • Hyderabad, Telangana, India