
SOC Analyst
Atos
full-time
Posted on:
Location Type: Office
Location: Bangalore • India
Visit company websiteExplore more
Tech Stack
About the role
- Monitor security logs in real time within the Security Operations Centre (SOC) from multiple network and security devices.
- Ensure timely detection, notification, investigation, and containment of threats across customer environments.
- Map observed adversary behaviors and incidents to relevant MITRE ATT&CK tactics and techniques for accurate threat classification.
- Enrich incident investigations using the MITRE ATT&CK framework to identify attacker objectives and predict potential next steps.
- Collaborate with Threat Intelligence teams to correlate Indicators of Compromise (IOCs) and Tactics, Techniques, and Procedures (TTPs) for proactive threat hunting.
- Review and validate incidents to ensure adherence to standard operating procedures (SOPs).
- Provide training, mentoring, and feedback to SOC analysts to improve quality of analysis and MITRE ATT&CK adoption.
- Identify and implement continuous improvements in monitoring use cases, threat scenarios, and operational procedures.
- Interact with customers to address queries and recommend service improvements.
- Perform root cause analysis (RCA) for monitoring errors, service gaps, and security incidents.
- Create weekly, monthly, and ad-hoc reports for clients and internal stakeholders.
- Periodically tune detection rules to reduce false positives and enhance alert accuracy.
- Collaborate with internal teams and external vendors during incident response and mitigation efforts.
- Conduct detailed RCA for security incidents and provide containment and remediation recommendations.
- Coordinate external audits and evidence collection related to SOC 2, SOX, NIST Cybersecurity Framework, and other compliance standards.
- Stay current with emerging threats, attack techniques, and security technologies.
- Track and manage key SOC KPIs and generate reports for core stakeholders.
Requirements
- Minimum 2 years of experience in a Security Operations Centre (SOC) or similar security operations role.
- Strong technical and operational understanding of SOC processes and workflows.
- Hands-on experience with SIEM platforms, including log ingestion, correlation, tuning, and analysis.
- Solid understanding of networking concepts (OSI Model, TCP/IP) and operating systems.
- Familiarity with security infrastructure components such as firewalls, proxies, WAFs, antivirus/EDR, and email gateways.
- Good understanding of the Cyber Kill Chain and MITRE ATT&CK framework.
- Ability to assist, guide, and mentor junior analysts with technical maturity and professionalism.
- Strong verbal and written communication skills.
- Excellent problem-solving and critical-thinking abilities.
- Eagerness to learn and stay updated with the evolving cybersecurity landscape.
- Strong interpersonal skills with the ability to collaborate effectively across teams and stakeholders.
Benefits
- Health insurance
- 401(k) matching
- Flexible work hours
- Paid time off
- Professional development opportunities
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard skills
incident responseroot cause analysisthreat huntinglog analysisSIEM platformsnetworking conceptsMITRE ATT&CK frameworksecurity incident containmentdetection rule tuningreport generation
Soft skills
mentoringcommunicationproblem-solvingcritical thinkinginterpersonal skillscollaborationtechnical maturityprofessionalismeagerness to learnfeedback provision