Please click on the Apply to verify the status of jobs posted more than 15 days ago, as they may have expired. Similar Jobs
Job Description
The Core Responsibilities For The Job Include The Following
Security Monitoring and Incident Response:
- Monitor and investigate alerts across SIEM, XDR, IDS/IPS, and email security tools.
- Own incident response end-to-end: triage, containment, RCA, and reporting.
- Improve and maintain IR playbooks and runbooks.
- Run hypothesis-based threat hunts using TTPs, IOCs, and behavioral patterns.
- Bring OSINT and threat intel insights into daily SOC workflows.
- Monitor the dark web for leaked credentials and data exposure.
- Build and tune high-quality detections using MITRE ATT& CK and CK
- Enhance SIEM dashboards, correlation rules, and SOAR automations.
- Reduce false positives and improve SOC efficiency.
- Analyze network traffic, packet captures, and protocol behaviors.
- Support NGFW- and WAF-based defenses.
- Investigate phishing attempts and strengthen email security.
- Onboard/validate log sources and ensure telemetry completeness.
- Use Linux, scripts, and APIs for log testing and troubleshooting.
- Purple teaming to validate detections and test defenses.
- 2+ years experience in SOC, IR, threat detection, or blue team operations.
- Hands-on experience with SIEM/XDR (preferably Google SecOps) platforms and alert analysis.
- Strong understanding of email security, EDR, networks, and cloud basics.
- Familiarity with MITRE ATT& CK and CK, cyber kill chain, and IOC/BIOC creation.
- Comfortable with Linux, scripting fundamentals, and API tools (Postman).
- Google Professional Security Operations Engineer.
- APIsec University - API Pen Testing.
- SOC/IR, EDR, or cloud security certifications (any).
- Clear communicator with strong documentation discipline.
- Calm under pressure, especially during active incidents.
Looking to get Placed? Try our Placement Guarantee Plan
- Curious, detail-oriented, and always eager to learn.
- 2+ years in SOC/IR, threat detection, or blue team operations.
- Hands-on with SIEM/XDR (ideally Google SecOps), alert triage, and investigation.
- Strong basics in email security, EDR, networks, and cloud.
- Experience with incident response (triage, containment, and RCA reporting).
- Threat hunting using TTPs/IOCs and familiarity with MITRE ATT& CK.
- Ability to build/tune detections and reduce false positives.
- Linux fundamentals, basic scripting, and API tools (Postman).
- Log onboarding/validation and basic purple team validation.
- Strong communication, documentation, and calmness during incidents
- Certifications: Google SecOps Engineer, APIsec, SOC/IR/Cloud certs.
- Experience with SOAR automation, SIEM dashboarding, and correlation logic.
- NGFW/WAF exposure and network packet analysis.
- Dark web monitoring and adversarial simulation experience.
- Strong scripting (Python/Bash/PowerShell) for automation.
- Additional cloud security hands-on and IAM familiarity.
Skills
PythonLinuxTestingApiCloudInformation SecurityIf an employer asks you to pay any kind of fee, please notify us immediately. Jobaaj does not charge any fee from the applicants and we do not allow other companies also to do so.
About Company
Important dates & deadlines?
Application Deadline
17 Jul 26, 06:34 PM IST
Similar Jobs
View All

