2

SOC Analyst Job Vacancies in Chennai

Opening For SOC Analyst

Laya Tech Pvt Ltd

  • 0 - 4 yrs
  • 4.8 Lac/Yr
  • Nungambakkam Chennai
Cybersecurity Malware Analysis Security Alerts Security Incident SIEM Incident Response EDRXDR IDSIPS Vulnerability Assessment MITRE ATT&CK NIST
We are looking for a proactive and detail-oriented SOC Analyst to join our Security Operations Center. The ideal candidate will be responsible for monitoring, detecting, analyzing, and responding to cybersecurity incidents using advanced tools such as SIEM, EDR, and threat intelligence platforms. This role plays a key part in defending the organizations IT infrastructure from cyber threats.Key Responsibilities:Monitor and analyze security alerts and events from SIEM and security tools.Investigate and respond to real-time threats, including malware, phishing, and intrusion attempts.Perform log analysis, correlate events, and escalate critical incidents.Work closely with the incident response team to contain and remediate security breaches.Maintain incident tickets and documentation of analysis and actions taken.Assist in tuning SIEM rules and maintaining threat detection playbooks.Stay updated with the latest vulnerabilities, TTPs (Tactics, Techniques, and Procedures), and threat intelligence.Required Skills:Experience with SIEM tools (e.g., Splunk, QRadar, Microsoft Sentinel).Understanding of cybersecurity principles, network protocols, and operating systems.Familiarity with tools such as EDR, antivirus, IDS/IPS, and firewalls.Basic scripting knowledge (Python, PowerShell) is a plus.Strong analytical, problem-solving, and documentation skills.Willingness to work in 24x7 shifts or rotational shifts if required.Qualifications:Bachelors degree in Computer Science, Information Security, or related field.13 years of experience in SOC or cybersecurity operations.Preferred certifications: CompTIA Security+, CEH, CySA+, or equivalent.
View all details
SOC Analyst SIEM
Candidate must have 5+ years of experience in security operations, incident response, or a related field. Strong understanding of security concepts, principles, and best practices. Proficiency in using SIEM tools (e.g., Splunk, Q Radar, ArcSight). Experience in developing and maintaining SOC rules, playbooks, and procedures. Knowledge of common security threats, vulnerabilities, and attack vectors. Experience with network and system security tools (e.g., firewalls, intrusion detection systems, antivirus). Experience with scripting languages (e.g., Python, PowerShell). Experience with cloud security (e.g., AWS, Azure, GCP).
View all details
SIEM IT Security Splunk Sentinel
Security Operations Center Experience. Good knowledge of networking topologies and technologies, including firewalling, routing and switching, Good knowledge of operating systems (Windows, Linux, UNIX,Macos) Solid understanding of current cyber-attack tactics/techniques and mitigation solutions. Knowledge on one or more SIEM tools, such as Splunk, Wazuh, Sentinel. Exposure to handling Security Centre alerts in cloud (Azure or AWS). Good communication skills Capable in working independently
View all details