Job Description
Job Title: SOC Analyst (L1) – Microsoft Sentinel
Location: Mohali (On-site)
Shift: US Shifts / As per SOC Operations
Experience: 1–2 Years
Job Overview:
We are looking for a motivated and detail-oriented SOC Analyst (L1) with hands-on experience in Microsoft Sentinel to join our Security Operations team. The ideal candidate should have a strong foundation in cybersecurity monitoring, incident detection, and response.
Key Responsibilities:
- Monitor security alerts and events using Microsoft Sentinel (SIEM)
- Analyze and triage security incidents, escalating when necessary
- Investigate suspicious activities, logs, and network traffic
- Perform initial incident response and documentation
- Work closely with SOC L2/L3 teams for incident resolution
- Maintain and update security dashboards, reports, and runbooks
- Ensure adherence to security policies and procedures
Required Skills & Qualifications:
- 1–2 years of experience in a SOC or cybersecurity role
- Hands-on experience with Microsoft Sentinel
- Basic understanding of SIEM, EDR, and security tools
- Knowledge of networking concepts (TCP/IP, DNS, HTTP, etc.)
- Familiarity with threat detection and incident response
- Understanding of cybersecurity frameworks and best practices
- Good analytical and problem-solving skills
- Strong written and verbal communication skills
Preferred Qualifications
- Certifications such as Security+, SC-200, or equivalent
- Experience with Azure security tools
- Knowledge of cloud security fundamentals
Pay: ₹25,000.00 - ₹35,000.00 per month
Work Location: In person
Want AI-powered job matching?
Upload your resume and get every job scored, your resume tailored, and hiring manager emails found - automatically.
Get Started Free