Talent.com
No longer accepting applications
SOC Level 1 Analyst

SOC Level 1 Analyst

CysigilChennai, IN
16 hours ago
Job description

SOC Level 1 Analyst

Location : Bengaluru, India

Experience : 0–3 Years

Employment Type : Full-Time (Onsite Only)

About the Role

We are hiring a Security Operations Center (SOC) Level 1 Analyst for a full-time onsite role. As a front-line cyber defender, you will monitor, analyze, and respond to security events using industry-leading tools like Elastic SIEM , Microsoft Sentinel , and CrowdStrike EDR . The ideal candidate should have a strong foundation in SOC operations , a passion for cybersecurity, and a desire to grow in an advanced threat detection environment.

Key Responsibilities

  • Monitor and analyze alerts from Elastic SIEM and Microsoft Sentinel to detect potential threats.
  • Perform initial triage of incidents, validate alerts, and escalate confirmed cases to L2 / L3 teams.
  • Investigate endpoint activity and correlate alerts using CrowdStrike Falcon EDR .
  • Identify and escalate suspicious behavior, potential intrusions, or security policy violations.
  • Document investigation details, root cause analysis, and shift handover notes accurately.
  • Maintain SOC dashboards, metrics, and ensure adherence to SLAs.
  • Participate in incident response activities as directed by senior analysts.
  • Continuously update knowledge on new threats, vulnerabilities, and TTPs aligned with the MITRE ATT&CK framework .

Required Skills

  • 0–3 years of hands-on or internship experience in a SOC or cybersecurity environment.
  • Strong understanding of SOC workflows – alert triage, escalation, and incident documentation .
  • Hands-on knowledge of Elastic SIEM and / or Microsoft Sentinel .
  • Experience or exposure to CrowdStrike Falcon EDR for endpoint analysis.
  • Good knowledge of Windows / Linux OS internals , networking protocols (TCP / IP, DNS, HTTP) , and log analysis .
  • Ability to analyze indicators of compromise (IOCs) and correlate with real-world attack patterns.
  • Excellent analytical thinking, attention to detail, and communication skills.
  • Willingness to work in 24×7 shifts (onsite).
  • Preferred Skills

  • Familiarity with KQL (Kusto Query Language) and Elastic Query DSL .
  • Basic scripting experience in Python, Bash, or PowerShell .
  • Knowledge of threat intelligence , MITRE ATT&CK , and common attack vectors .
  • Certifications such as CompTIA Security+ , EC-Council CSA , Microsoft SC-200 , or equivalent.
  • Why Join Us

  • Work onsite in a high-performance SOC with exposure to global threat detection.
  • Hands-on experience with cutting-edge tools and technologies (Elastic, Sentinel, CrowdStrike).
  • Learning and mentorship opportunities from senior SOC professionals.
  • Career growth path into L2 Analyst, Threat Hunter, or Incident Responder roles.
  • Competitive salary, shift allowances, and comprehensive benefits.
  • #Hiring #CyberSecurityJobs #SOCAnalyst #ElasticSIEM #Sentinel #CrowdStrike #IncidentResponse #OnsiteJob #InfoSec #L1Analyst #CyberDefense #SOCOperations

    Create a job alert for this search

    Soc Analyst • Chennai, IN