SOC Analyst – Level 1
Techsec Digital Global
About the role
Job Title
SOC Analyst – Level 1 (L1)
Department
Cybersecurity / Security Operations
Reports To
SOC Manager / Security Operations Lead
Location
Goregaon/Malad West, Mumbai - 400064
Job Type
Full-Time, 24x7 Shift
Job Summary
We are seeking a highly motivated and detail‑oriented SOC Analyst L1 to join our Security Operations Centre. As a Level 1 Analyst, you will be the first line of defence, responsible for monitoring security alerts, performing initial analysis, and escalating potential threats. This is an excellent opportunity to start your career in cybersecurity and grow in a dynamic and fast‑paced environment.
Key Responsibilities
- Monitor and analyse security events and alerts from SIEM, EDR, firewall, IDS/IPS, and other security tools.
- Perform initial triage and classification of incidents.
- Escalate confirmed incidents to L2/L3 analysts or incident response teams.
- Document all actions taken in ticketing and incident management systems.
- Support threat detection and analysis using threat intelligence feeds.
- Conduct routine checks on systems to ensure security tools are functioning correctly.
- Follow predefined playbooks and standard operating procedures (SOPs).
- Assist with vulnerability scanning and log analysis.
- Provide accurate and timely reporting on incidents and system health.
- Collaborate with other SOC team members and IT teams.
Required Skills & Qualifications
- Bachelor’s degree in information technology, Cybersecurity, Computer Science, or related field (or equivalent experience).
- Basic understanding of networking concepts (TCP/IP, DNS, firewalls).
- Familiarity with cybersecurity concepts (malware, phishing, DDoS, exploits).
- Exposure to security tools such as SIEM (e.g., Splunk, QRadar, or ArcSight or AiSIEM), antivirus, firewalls, EDR etc.
- Strong analytical and problem‑solving skills.
- Good communication and documentation skills.
- Willingness to work in shifts (24x7 environment).
- Certifications such as CompTIA Security+, CEH, or Microsoft SC‑200 (optional but advantageous).
Benefits
We provide necessary benefits as per company policies, including:
- Provident Fund
- Gratuity
- Mediclaim
Requirements
- Basic understanding of networking concepts (TCP/IP, DNS, firewalls).
- Familiarity with cybersecurity concepts (malware, phishing, DDoS, exploits).
- Exposure to security tools such as SIEM (e.g., Splunk, QRadar, or ArcSight or AiSIEM), antivirus, firewalls, EDR etc.
- Strong analytical and problem -solving skills.
- Good communication and documentation skills.
- Willingness to work in shifts (24x7 environment).
Responsibilities
- Monitor and analyse security events and alerts from SIEM, EDR, firewall, IDS/IPS, and other security tools.
- Perform initial triage and classification of incidents.
- Escalate confirmed incidents to L2/L3 analysts or incident response teams.
- Document all actions taken in ticketing and incident management systems.
- Support threat detection and analysis using threat intelligence feeds.
- Conduct routine checks on systems to ensure security tools are functioning correctly.
- Follow predefined playbooks and standard operating procedures (SOPs).
- Assist with vulnerability scanning and log analysis.
- Provide accurate and timely reporting on incidents and system health.
- Collaborate with other SOC team members and IT teams.
Benefits
Skills
Don't send a generic resume
Paste this job description into Mimi and get a resume tailored to exactly what the hiring team is looking for.
Get started free