Kochi
18 hours ago
SOC Analyst II

Job Description – Cyber Security Analyst (SOC Operations)

Role Proficiency:

Monitor cybersecurity incidents for global customers in a 24x7x365 operations team under the supervision of a Team Lead or senior members.

Key Outcomes:

Ensure cybersecurity incidents from SIEM and multiple sources are addressed as per SLA under supervision. Seek support from senior team members for new or complex incidents. Independently respond to low and medium-complexity incidents. Follow documented playbooks for consistent and repeatable responses. Maintain documentation in CDC/SIEM work logs as per predefined standards. Learn from the review process for continuous improvement. Communicate and escalate incidents as per the defined process. Suggest updates or inclusions in the playbook to senior team members. Assist the Team Lead in reviewing junior team members' work. Adhere to defined SOC processes, including housekeeping tasks. Follow company and customer-defined Information Security policies.

Measures of Success:

SLA adherence as agreed with the customer. Productivity: Number of incidents addressed. Quality: Percentage of tickets meeting quality norms. Compliance: Zero non-compliance (NC) during audits. Evidence of skill development (training, certifications, etc.).

Key Responsibilities & Expected Outputs:

Cyber Security Monitoring Monitor security events in the CDC Platform/SIEM Tool under the Playbook's guidance. Ensure appropriate response aligned with SLAs. Cyber Security Incident Management Analyze, triage, and resolve incidents under Team Lead supervision. Communicate and escalate incidents as per the defined process. Ensure accurate documentation in CDC/SIEM logs to maintain an audit trail. Generate and publish reports for stakeholders as per Playbook guidelines. Continuous Learning, Innovation & Optimization Complete assigned learning programs and training. Suggest improvements and innovations for process optimization. Provide input for playbook updates. Team Collaboration Assist junior team members when possible.

Skills Required:

Proficiency in using CDC, SIEM, and other relevant security tools. Ability to identify use cases and suggest process improvements. Strong analytical and problem-solving skills for incident triage. Excellent verbal and written communication skills. Willingness to work in rotating shifts and be on-call outside regular hours. High integrity and ability to pass a background check.

Knowledge & Qualifications:

Experience: 1–3 years in SOC operations within a global organization. Education: University degree in Cyber Security (no backlogs) / Bachelor's in Science or Engineering with cybersecurity training. Technical Knowledge: Proficient in cybersecurity incident management. Understanding of enterprise IT infrastructure (Networks, Firewalls, OS, Databases, Web Applications, etc.). Familiarity with ISMS principles and frameworks (e.g., ISO 27001). Desirable Certifications: Ethical Hacking, SIEM Tool training, or equivalent.
Confirm your E-mail: Send Email