SOC Level 1 Analyst
Location : Bengaluru, India
Experience : 0–3 Years
Employment Type : Full-Time (Onsite Only)
About the Role
We are hiring a Security Operations Center (SOC) Level 1 Analyst for a full-time onsite role. As a front-line cyber defender, you will monitor, analyze, and respond to security events using industry-leading tools like Elastic SIEM , Microsoft Sentinel , and CrowdStrike EDR . The ideal candidate should have a strong foundation in SOC operations , a passion for cybersecurity, and a desire to grow in an advanced threat detection environment.
Key Responsibilities
- Monitor and analyze alerts from Elastic SIEM and Microsoft Sentinel to detect potential threats.
- Perform initial triage of incidents, validate alerts, and escalate confirmed cases to L2 / L3 teams.
- Investigate endpoint activity and correlate alerts using CrowdStrike Falcon EDR .
- Identify and escalate suspicious behavior, potential intrusions, or security policy violations.
- Document investigation details, root cause analysis, and shift handover notes accurately.
- Maintain SOC dashboards, metrics, and ensure adherence to SLAs.
- Participate in incident response activities as directed by senior analysts.
- Continuously update knowledge on new threats, vulnerabilities, and TTPs aligned with the MITRE ATT&CK framework .
Required Skills
0–3 years of hands-on or internship experience in a SOC or cybersecurity environment.Strong understanding of SOC workflows – alert triage, escalation, and incident documentation .Hands-on knowledge of Elastic SIEM and / or Microsoft Sentinel .Experience or exposure to CrowdStrike Falcon EDR for endpoint analysis.Good knowledge of Windows / Linux OS internals , networking protocols (TCP / IP, DNS, HTTP) , and log analysis .Ability to analyze indicators of compromise (IOCs) and correlate with real-world attack patterns.Excellent analytical thinking, attention to detail, and communication skills.Willingness to work in 24×7 shifts (onsite).Preferred Skills
Familiarity with KQL (Kusto Query Language) and Elastic Query DSL .Basic scripting experience in Python, Bash, or PowerShell .Knowledge of threat intelligence , MITRE ATT&CK , and common attack vectors .Certifications such as CompTIA Security+ , EC-Council CSA , Microsoft SC-200 , or equivalent.Why Join Us
Work onsite in a high-performance SOC with exposure to global threat detection.Hands-on experience with cutting-edge tools and technologies (Elastic, Sentinel, CrowdStrike).Learning and mentorship opportunities from senior SOC professionals.Career growth path into L2 Analyst, Threat Hunter, or Incident Responder roles.Competitive salary, shift allowances, and comprehensive benefits.#Hiring #CyberSecurityJobs #SOCAnalyst #ElasticSIEM #Sentinel #CrowdStrike #IncidentResponse #OnsiteJob #InfoSec #L1Analyst #CyberDefense #SOCOperations