Talent.com
This job offer is not available in your country.
Security Operations Analyst

Security Operations Analyst

Insight GlobalIndia
21 hours ago
Job description

Required Skills & Experience

7-10 years of experience in a SOC or cybersecurity operations role.

Proficiency with Google Chronicle, including rule tuning, log analysis, and case management.

Experience with SIEM tools (e.g., Splunk, QRadar, Elastic Stack) and SOAR platforms.

Strong understanding of TCP / IP, DNS, HTTP / S, and other network protocols.

Familiarity with endpoint detection tools (e.g., CrowdStrike, MS Defender), IDS / IPS, and vulnerability scanners (e.g., Nessus, Qualys).

Scripting skills in Python, Bash, or PowerShell for automation and data parsing.

Nice to Have Skills & Experience

Bachelor’s degree in Cybersecurity, Computer Science, or related field.

Certifications such as CompTIA Security+, GIAC (GCIH, GCIA), CEH, or Google Cloud Security Engineer.

Prior experience supporting federal or financial clients.

Experience with red / blue / purple team exercises and threat hunting.

Job Description

We are seeking a Security Operations Center (SOC) Analyst with hands-on experience in Google SecOps Chronicle to join our cybersecurity team. This role is critical to monitoring, analyzing, and responding to security threats across cloud and hybrid environments. The ideal candidate will be comfortable working in high-pressure situations, collaborating across teams, and leveraging Chronicle’s SIEM / SOAR capabilities to enhance threat detection and response.

  • Monitor and triage security alerts using Google SecOps Chronicle, including YARA-L rule authoring and alert enrichment.
  • Investigate incidents across cloud, network, and endpoint environments using Chronicle’s case management and investigative tools.
  • Develop and maintain log ingestion pipelines using tools like Bindplane, Cribl, or Logstash.
  • Collaborate with Tier-2 / 3 analysts and threat intelligence teams to refine detection rules and reduce false positives.
  • Participate in incident response activities including containment, eradication, and recovery.
  • Create and maintain SOC playbooks and automation workflows using Chronicle’s SOAR capabilities.
  • Conduct packet analysis, malware triage, and forensic investigations as needed.

Stay current on threat landscapes, compliance standards (e.g., MITRE ATT&CK, GDPR, PCI-DSS), and emerging security technologies.

This position will pay $15 / hour and is located in Hyderabad India.

Create a job alert for this search

Security Analyst • India