Skip to content
mimi

Staff / Senior Staff - SOC Analyst

Netradyne

India · On-site Full-time Lead 3w ago

About the role

Job Title

Staff / Senior Staff - SOC Analyst

Location

Netradyne, Bangalore

Experience

6 to 13 years

About Netradyne

  • Netradyne is a leader in cutting‑edge AI‑powered safety and fleet management technology. We strive to enhance driver safety, operational efficiency, and overall user experience. As an innovative and rapidly growing company, we are committed to securing a connected future for the transportation industry through technological advancements

Role Overview

The SOC Analyst will be responsible for monitoring, detecting, investigating, and responding to cybersecurity threats across enterprise systems, cloud infrastructure, SaaS platforms, and applications. The role supports the Security Operations Center in protecting company assets, customer data, and platform availability.

Key Responsibilities

Security Monitoring

  • Monitor alerts and logs from SIEM, EDR, and cloud security platforms
  • Investigate security alerts and perform initial incident triage
  • Monitor logs from endpoint, network, identity, and email security systems

Incident Detection & Response

  • Analyze suspicious activities and determine severity
  • Escalate incidents as per SOC response playbooks
  • Support incident investigation, containment, and root cause analysis

Threat Hunting & Intelligence

  • Perform proactive threat hunting
  • Analyze Indicators of Compromise (IOCs)
  • Monitor emerging cybersecurity threats

Cloud & SaaS Security Monitoring

  • Monitor security events across platforms such as:
    • Amazon Web Services (AWS)
    • Microsoft Azure
    • Microsoft 365
    • Salesforce
  • Focus areas include:
    • Identity misuse / Unauthorized access attempts
    • Cloud misconfigurations
    • Data exfiltration alerts

Alert Triage & Documentation

  • Review alerts and create incident tickets
  • Document investigations and findings
  • Maintain SOC playbooks and runbooks

SOC Automation & Improvement

  • Support SOC workflow automation
  • Improve detection rules and monitoring coverage
  • Contribute to SOC maturity initiatives

Required Skills

  • Experience with SIEM tools (Splunk, Sentine l, Wazuh)
  • Cloud security m onitoring
  • Networking and security fun damentals
  • Log analysis and incident inve stigation
  • Knowledge of MITRE ATT&CK framework
  • Endpoint security
  • Identity and access m anagement
  • Email security
  • Threat detectionS
  • oft SkillsStrong analytical and problem-solv ing skills
  • Good documentation and reporting abilities
  • Ability to work in 24×7 SOC shift e nvironment
  • Collaboration with IT, DevOps, and enginee ring teams

Requirements

  • Experience with SIEM tools (Splunk, Sentinel, Wazuh)
  • Cloud security monitoring
  • Networking and security fundamentals
  • Log analysis and incident investigation
  • Knowledge of MITRE ATT&CK framework
  • Endpoint security
  • Identity and access management
  • Email security
  • Threat detection
  • Strong analytical and problem-solving skills
  • Good documentation and reporting abilities
  • Ability to work in 24x7 SOC shift environment
  • Collaboration with IT, DevOps, and engineering teams

Responsibilities

  • Monitor alerts and logs from SIEM, EDR, and cloud security platforms
  • Investigate security alerts and perform initial incident triage
  • Monitor logs from endpoint, network, identity, and email security systems
  • Analyze suspicious activities and determine severity
  • Escalate incidents as per SOC response playbooks
  • Support incident investigation, containment, and root cause analysis
  • Perform proactive threat hunting
  • Analyze Indicators of Compromise (IOCs)
  • Monitor emerging cybersecurity threats
  • Monitor security events across platforms such as: Amazon Web Services (AWS), Microsoft Azure, Microsoft 365, Salesforce
  • Focus areas include: Identity misuse, Unauthorized access attempts, Cloud misconfigurations, Data exfiltration alerts
  • Review alerts and create incident tickets
  • Document investigations and findings
  • Maintain SOC playbooks and runbooks
  • Support SOC workflow automation
  • Improve detection rules and monitoring coverage
  • Contribute to SOC maturity initiatives

Skills

AWSAzureCloud securityCybersecurityData exfiltrationDetection rulesEDREmail securityEndpoint securityIdentity and access managementIncident detectionIncident investigationIOCsLog analysisMITRE ATT&CKMicrosoft 365NetworkingSalesforceSecurity fundamentalsSIEMSplunkThreat detectionThreat huntingWazuh

Don't send a generic resume

Paste this job description into Mimi and get a resume tailored to exactly what the hiring team is looking for.

Get started free