Talent.com
No longer accepting applications
SOC Level 1 Analyst

SOC Level 1 Analyst

CysigilNavi Mumbai, Maharashtra, India
22 hours ago
Job description

SOC Level 1 Analyst

Location : Bengaluru, India

Experience : 0–3 Years

Employment Type :

Full-Time (Onsite Only)

About the Role

We are hiring a

Security Operations Center (SOC) Level 1 Analyst

for a full-time onsite role. As a front-line cyber defender, you will monitor, analyze, and respond to security events using industry-leading tools like

Elastic SIEM ,

Microsoft Sentinel , and

CrowdStrike EDR . The ideal candidate should have a strong foundation in

SOC operations , a passion for cybersecurity, and a desire to grow in an advanced threat detection environment.

Key Responsibilities

Monitor and analyze alerts from

Elastic SIEM

and

Microsoft Sentinel

to detect potential threats.

Perform initial triage of incidents, validate alerts, and escalate confirmed cases to L2 / L3 teams.

Investigate endpoint activity and correlate alerts using

CrowdStrike Falcon EDR .

Identify and escalate suspicious behavior, potential intrusions, or security policy violations.

Document investigation details, root cause analysis, and shift handover notes accurately.

Maintain SOC dashboards, metrics, and ensure adherence to SLAs.

Participate in incident response activities as directed by senior analysts.

Continuously update knowledge on new threats, vulnerabilities, and TTPs aligned with the

MITRE ATT&CK framework .

Required Skills

0–3 years of hands-on or internship experience in a SOC or cybersecurity environment.

Strong understanding of SOC workflows –

alert triage, escalation, and incident documentation .

Hands-on knowledge of

Elastic SIEM

and / or

Microsoft Sentinel .

Experience or exposure to

CrowdStrike Falcon EDR

for endpoint analysis.

Good knowledge of

Windows / Linux OS internals ,

networking protocols (TCP / IP, DNS, HTTP) , and

log analysis .

Ability to analyze indicators of compromise (IOCs) and correlate with real-world attack patterns.

Excellent analytical thinking, attention to detail, and communication skills.

Willingness to work in 24×7 shifts (onsite).

Preferred Skills

Familiarity with

KQL

(Kusto Query Language) and

Elastic Query DSL .

Basic scripting experience in

Python, Bash, or PowerShell .

Knowledge of

threat intelligence ,

MITRE ATT&CK , and

common attack vectors .

Certifications such as

CompTIA Security+ ,

EC-Council CSA ,

Microsoft SC-200 , or equivalent.

Why Join Us

Work onsite in a high-performance SOC with exposure to global threat detection.

Hands-on experience with cutting-edge tools and technologies (Elastic, Sentinel, CrowdStrike).

Learning and mentorship opportunities from senior SOC professionals.

Career growth path into L2 Analyst, Threat Hunter, or Incident Responder roles.

Competitive salary, shift allowances, and comprehensive benefits.

#Hiring #CyberSecurityJobs #SOCAnalyst #ElasticSIEM #Sentinel #CrowdStrike #IncidentResponse #OnsiteJob #InfoSec #L1Analyst #CyberDefense #SOCOperations

Create a job alert for this search

Soc Analyst • Navi Mumbai, Maharashtra, India