SOC Level 1 Analyst
Location : Bengaluru, India
Experience : 0–3 Years
Employment Type :
Full-Time (Onsite Only)
About the Role
We are hiring a
Security Operations Center (SOC) Level 1 Analyst
for a full-time onsite role. As a front-line cyber defender, you will monitor, analyze, and respond to security events using industry-leading tools like
Elastic SIEM ,
Microsoft Sentinel , and
CrowdStrike EDR . The ideal candidate should have a strong foundation in
SOC operations , a passion for cybersecurity, and a desire to grow in an advanced threat detection environment.
Key Responsibilities
Monitor and analyze alerts from
Elastic SIEM
and
Microsoft Sentinel
to detect potential threats.
Perform initial triage of incidents, validate alerts, and escalate confirmed cases to L2 / L3 teams.
Investigate endpoint activity and correlate alerts using
CrowdStrike Falcon EDR .
Identify and escalate suspicious behavior, potential intrusions, or security policy violations.
Document investigation details, root cause analysis, and shift handover notes accurately.
Maintain SOC dashboards, metrics, and ensure adherence to SLAs.
Participate in incident response activities as directed by senior analysts.
Continuously update knowledge on new threats, vulnerabilities, and TTPs aligned with the
MITRE ATT&CK framework .
Required Skills
0–3 years of hands-on or internship experience in a SOC or cybersecurity environment.
Strong understanding of SOC workflows –
alert triage, escalation, and incident documentation .
Hands-on knowledge of
Elastic SIEM
and / or
Microsoft Sentinel .
Experience or exposure to
CrowdStrike Falcon EDR
for endpoint analysis.
Good knowledge of
Windows / Linux OS internals ,
networking protocols (TCP / IP, DNS, HTTP) , and
log analysis .
Ability to analyze indicators of compromise (IOCs) and correlate with real-world attack patterns.
Excellent analytical thinking, attention to detail, and communication skills.
Willingness to work in 24×7 shifts (onsite).
Preferred Skills
Familiarity with
KQL
(Kusto Query Language) and
Elastic Query DSL .
Basic scripting experience in
Python, Bash, or PowerShell .
Knowledge of
threat intelligence ,
MITRE ATT&CK , and
common attack vectors .
Certifications such as
CompTIA Security+ ,
EC-Council CSA ,
Microsoft SC-200 , or equivalent.
Why Join Us
Work onsite in a high-performance SOC with exposure to global threat detection.
Hands-on experience with cutting-edge tools and technologies (Elastic, Sentinel, CrowdStrike).
Learning and mentorship opportunities from senior SOC professionals.
Career growth path into L2 Analyst, Threat Hunter, or Incident Responder roles.
Competitive salary, shift allowances, and comprehensive benefits.
#Hiring #CyberSecurityJobs #SOCAnalyst #ElasticSIEM #Sentinel #CrowdStrike #IncidentResponse #OnsiteJob #InfoSec #L1Analyst #CyberDefense #SOCOperations
Soc Analyst • Coimbatore, Tamil Nadu, India