KR

SOC Analyst

Kroll
Bangalore6-9 LPA Posted 12 Sept 2025
FULL TIME
Security Operations

Job Description

Role Overview

As a SOC Analyst supporting one of our client engagements, you will be responsible for monitoring, analysing, and resolving security-related tickets as part of a dedicated 16x5 Security Operations Centre. This role is critical to ensuring timely triage and resolution of incidents, maintaining compliance with our client s security standards, and supporting continuous improvement of detection and response capabilities.

Key Responsibilities

  • Ticket Analysis & Resolution: Review, investigate, and resolve security tickets raised through our client s monitoring systems and service desk workflows.
  • Alert Triage: Priorities and categories alerts based on severity, impact, and relevance to our client s threat landscape.
  • Incident Documentation: Maintain accurate and detailed records of investigations, actions taken, and resolution outcomes in our client s ticketing system.
  • Collaboration: Work closely with our client s internal teams, including infrastructure, application, and compliance teams, to ensure coordinated incident handling.
  • Playbook Execution: Follow and refine client-specific response playbooks and standard operating procedures (SOPs).
  • Shift Handover: Ensure clear and complete handover documentation between shifts to maintain continuity of operations.
  • Required Skills & Qualifications1 3 years of experience in a SOC or cybersecurity operations role.
  • Familiarity with SIEM platforms (e.g., Microsoft Sentinel, Log Rhythm), ticketing systems (e.g., ServiceNow, Xurrent), and endpoint protection tools (e.g., Microsoft Defender, Sentinel One).
  • Experience supporting and resolving common SOC playbook scenarios (e.g., phishing emails, Windows/Linux malware, Microsoft 365/ Entra ID account compromise)
  • Strong analytical skills and attention to detail in reviewing logs, alerts, and incident data.
  • Understanding of cybersecurity frameworks such as MITRE ATT&CK and NIST.
  • Excellent written and verbal communication skills for documenting incidents and collaborating with stakeholders.
  • Bachelor s degree in Computer Science, Information Security, or a related field.
  • Preferred Certifications Comp TIA Security+, CEH, or Microsoft SC-200.
  • ITIL Foundation (for understanding ticketing and service workflows).
  • Working Hours Rotational shifts within a 16x5 schedule (Monday to Friday).
  • After-hours and weekend on-call rotation
  • Flexibility to support critical incidents outside standard hours when required.

Required Skills

Join WhatsApp Channel