Himalayas logo
EX

SOC Analyst

Executive
India only

Stay safe on Himalayas

Never send money to companies. Jobs on Himalayas will never require payment from applicants.

Location: India (Bangalore or Mumbai)

Reports to: SOC Manager – Client Programme

Engagement Model: Client-dedicated, 16x7

Role Overview

As a SOC Analyst supporting one of our client engagements, you will be responsible for monitoring, analysing, and resolving security-related tickets as part of a dedicated 16x5 Security Operations Centre. This role is critical to ensuring timely triage and resolution of incidents, maintaining compliance with our client’s security standards, and supporting continuous improvement of detection and response capabilities.

Key Responsibilities

  • Ticket Analysis & Resolution: Review, investigate, and resolve security tickets raised through our client’s monitoring systems and service desk workflows.

  • Alert Triage: Prioritise and categorise alerts based on severity, impact, and relevance to our client’s threat landscape.

  • Incident Documentation: Maintain accurate and detailed records of investigations, actions taken, and resolution outcomes in our client’s ticketing system.

  • Collaboration: Work closely with our client’s internal teams, including infrastructure, application, and compliance teams, to ensure coordinated incident handling.

  • Playbook Execution: Follow and refine client-specific response playbooks and standard operating procedures (SOPs).

  • Shift Handover: Ensure clear and complete handover documentation between shifts to maintain continuity of operations.

Required Skills & Qualifications

  • 1–3 years of experience in a SOC or cybersecurity operations role.

  • Familiarity with SIEM platforms (e.g., Microsoft Sentinel, LogRhythm), ticketing systems (e.g., ServiceNow, Xurrent), and endpoint protection tools (e.g., Microsoft Defender, SentinelOne).

  • Experience supporting and resolving common SOC playbook scenarios (e.g., phishing emails, Windows/Linux malware, Microsoft 365/Entra ID account compromise)

  • Strong analytical skills and attention to detail in reviewing logs, alerts, and incident data.

  • Understanding of cybersecurity frameworks such as MITRE ATT&CK and NIST.

  • Excellent written and verbal communication skills for documenting incidents and collaborating with stakeholders.

  • Bachelor’s degree in Computer Science, Information Security, or a related field.

Preferred Certifications

  • CompTIA Security+, CEH, or Microsoft SC-200.

  • ITIL Foundation (for understanding ticketing and service workflows).

Working Hours

  • Rotational shifts within a 16x5 schedule (Monday to Friday).

  • After-hours and weekend on-call rotation

  • Flexibility to support critical incidents outside standard hours when required.

About the job

Apply before

Posted on

Job type

Full Time

Experience level

Entry-level
Mid-level

Location requirements

Hiring timezones

India +/- 0 hours
Claim this profileEX

Executive

View company profile

Similar remote jobs

Here are other jobs you might want to apply for.

View all remote jobs

6 remote jobs at Executive

Explore the variety of open remote roles at Executive, offering flexible work options across multiple disciplines and skill levels.

View all jobs at Executive

Remote companies like Executive

Find your next opportunity by exploring profiles of companies that are similar to Executive. Compare culture, benefits, and job openings on Himalayas.

View all companies

Find your dream job

Sign up now and join over 100,000 remote workers who receive personalized job alerts, curated job matches, and more for free!

Sign up
Himalayas profile for an example user named Frankie Sullivan