Skip to content
mimi

SOC Analyst – Level 1

Techsec Digital Global

India · On-site Full-time Entry Level Yesterday

About the role

Job Title

SOC Analyst – Level 1 (L1)

Department

Cybersecurity / Security Operations

Reports To

SOC Manager / Security Operations Lead

Location

Goregaon/Malad West, Mumbai - 400064

Job Type

Full-Time, 24x7 Shift

Job Summary

We are seeking a highly motivated and detail‑oriented SOC Analyst L1 to join our Security Operations Centre. As a Level 1 Analyst, you will be the first line of defence, responsible for monitoring security alerts, performing initial analysis, and escalating potential threats. This is an excellent opportunity to start your career in cybersecurity and grow in a dynamic and fast‑paced environment.

Key Responsibilities

  • Monitor and analyse security events and alerts from SIEM, EDR, firewall, IDS/IPS, and other security tools.
  • Perform initial triage and classification of incidents.
  • Escalate confirmed incidents to L2/L3 analysts or incident response teams.
  • Document all actions taken in ticketing and incident management systems.
  • Support threat detection and analysis using threat intelligence feeds.
  • Conduct routine checks on systems to ensure security tools are functioning correctly.
  • Follow predefined playbooks and standard operating procedures (SOPs).
  • Assist with vulnerability scanning and log analysis.
  • Provide accurate and timely reporting on incidents and system health.
  • Collaborate with other SOC team members and IT teams.

Required Skills & Qualifications

  • Bachelor’s degree in information technology, Cybersecurity, Computer Science, or related field (or equivalent experience).
  • Basic understanding of networking concepts (TCP/IP, DNS, firewalls).
  • Familiarity with cybersecurity concepts (malware, phishing, DDoS, exploits).
  • Exposure to security tools such as SIEM (e.g., Splunk, QRadar, or ArcSight or AiSIEM), antivirus, firewalls, EDR etc.
  • Strong analytical and problem‑solving skills.
  • Good communication and documentation skills.
  • Willingness to work in shifts (24x7 environment).
  • Certifications such as CompTIA Security+, CEH, or Microsoft SC‑200 (optional but advantageous).

Benefits

We provide necessary benefits as per company policies, including:

  • Provident Fund
  • Gratuity
  • Mediclaim

Requirements

  • Basic understanding of networking concepts (TCP/IP, DNS, firewalls).
  • Familiarity with cybersecurity concepts (malware, phishing, DDoS, exploits).
  • Exposure to security tools such as SIEM (e.g., Splunk, QRadar, or ArcSight or AiSIEM), antivirus, firewalls, EDR etc.
  • Strong analytical and problem -solving skills.
  • Good communication and documentation skills.
  • Willingness to work in shifts (24x7 environment).

Responsibilities

  • Monitor and analyse security events and alerts from SIEM, EDR, firewall, IDS/IPS, and other security tools.
  • Perform initial triage and classification of incidents.
  • Escalate confirmed incidents to L2/L3 analysts or incident response teams.
  • Document all actions taken in ticketing and incident management systems.
  • Support threat detection and analysis using threat intelligence feeds.
  • Conduct routine checks on systems to ensure security tools are functioning correctly.
  • Follow predefined playbooks and standard operating procedures (SOPs).
  • Assist with vulnerability scanning and log analysis.
  • Provide accurate and timely reporting on incidents and system health.
  • Collaborate with other SOC team members and IT teams.

Benefits

Provident FundGratuityMediclaim

Skills

AiSIEMArcSightantiviruscybersecurityDNSDockerEDRfirewallIDS/IPSmalwarenetworkingphishingQRadarSIEMSplunkTCP/IPthreat intelligence

Don't send a generic resume

Paste this job description into Mimi and get a resume tailored to exactly what the hiring team is looking for.

Get started free