We are seeking a skilled and detail-oriented SOC Security Analyst to join our 24x7 Security Operations Center (SOC) team in Hyderabad. The ideal candidate will have hands-on experience with Seceon AI-SIEM, manual and automated VAPT, and incident response, with strong analytical and scripting skills.
You will be responsible for real-time monitoring, threat detection, investigation, and proactive response to security incidents across enterprise systems.
Key Responsibilities:Security Monitoring & Incident Response:
- Monitor and analyze security events from Seceon AI-SIEM, firewalls, IDS/IPS, and endpoint tools.
- Investigate correlated alerts, validate false positives, and escalate verified threats.
- Perform malware and network forensics, ensuring quick incident containment and mitigation.
- Conduct proactive threat hunting using AI-driven SOC automation and analytics modules.
- Maintain SOC documentation, playbooks, and workflows for incident response.
- Collaborate with IT and application teams to remediate vulnerabilities and security incidents.
- Recommend policy fine-tuning, threshold calibrations, and automated response improvements for Seceon and SOAR tools.
- Create dashboards, reports, and custom queries (SPL, log parsing, data ingestion optimization).
Vulnerability Assessment & Penetration Testing (VAPT):
- Perform manual and automated VAPT on web, network, mobile, and infrastructure layers using tools like Burp Suite, Nmap, Nessus, Metasploit.
- Conduct threat modeling, exploit validation, and post-exploitation testing.
- Document vulnerabilities with CVE mapping, impact analysis, and remediation guidance.
- Deliver technical and executive-level VAPT reports for stakeholders.
- Apply security frameworks such as OWASP, NIST, and ISO 27001 during testing and mitigation.
Skills & Competencies:
- Proficiency with Seceon AI-SIEM, SOAR platforms, and threat intelligence integrations.
- Strong expertise in manual vulnerability discovery, exploit development, and risk assessment.
- Scripting knowledge in Python and PowerShell for automation and analysis.
- Solid understanding of network security protocols, digital forensics, and incident lifecycle management.
- Familiarity with MITRE ATT&CK framework, IOC correlation, and real-time threat analysis.
- Excellent problem-solving, documentation, and communication skills.
Qualifications & Certifications:
- Bachelor of Computer Applications (B.C.A.) or equivalent degree in Cybersecurity, IT, or Computer Science.
- 2–3 years of SOC experience, preferably with Seceon or IBM Q-Radar.
- Preferred Certifications: CEH, OSCP, CompTIA Security+, or Seceon SOC Certification.
Mandatory Skills: SOC, Seceon AI-SIEM, IDS/IPS, Firewalls, Automated & Manual VAPT, Python, PowerShell, Q-Radar
Additional Skills: SOAR Tools, Threat Intelligence, Network Forensics
Job Type: Full-time
Pay: ₹400,000.00 - ₹600,000.00 per year