Skip to main content
Fulcrum Digital logo

SOC Analyst

Fulcrum Digital
Be an Early ApplicantFull Timeentry
Maharashtra, INPosted March 12, 2026

Resume Keywords to Include

Make sure these keywords appear in your resume to improve ATS scoring

PythonBashAWSGCPAzureAgile

Sign up free to auto-tailor your resume with all these keywords and get a higher ATS score

Job Description

Who are we

Fulcrum Digital is an agile and next-generation digital accelerating company providing digital transformation and technology services right from ideation to implementation. These services have applicability across a variety of industries, including banking & financial services, insurance, retail, higher education, food, healthcare, and manufacturing.

Job Summary

We are seeking a proactive and detail-oriented SOC Analyst to join our Security Operations Center team. The SOC Analyst will monitor, detect, investigate, and respond to cybersecurity incidents to protect the organization’s systems, networks, and data. The ideal candidate has strong analytical skills and hands-on experience with security monitoring tools.

Key Responsibilities

Monitoring & Detection

  • Monitor security alerts and events from SIEM, EDR, IDS/IPS, firewalls, and other security tools
  • Analyze logs from servers, endpoints, cloud environments, and network devices
  • Identify suspicious activities and potential security threats

Incident Response

  • Investigate security incidents and determine severity and impact
  • Contain, eradicate, and recover from security incidents
  • Escalate complex incidents to senior analysts or incident response teams
  • Document incidents, actions taken, and resolution steps

Threat Intelligence & Analysis

  • Correlate threat intelligence with security alerts
  • Perform basic malware analysis and phishing investigations
  • Identify trends and recurring threats

Reporting & Documentation

  • Maintain accurate incident records and reports
  • Develop playbooks and standard operating procedures
  • Provide shift handover reports and status updates

Continuous Improvement

  • Assist in tuning SIEM rules to reduce false positives
  • Recommend improvements to detection and response capabilities
  • Participate in security drills and tabletop exercises

Required Qualifications

  • Bachelor’s degree in Cybersecurity, IT, Computer Science, or related field (or equivalent experience)
  • 1–3 years of experience in cybersecurity or SOC environment
  • Familiarity with SIEM tools (e.g., QRadar, Sentinel)
  • Understanding of networking fundamentals (TCP/IP, DNS, HTTP)
  • Knowledge of security concepts (malware, phishing, ransomware, MITRE ATT&CK)

Preferred Qualifications

  • Certifications such as Security+, CEH, CySA+, GCIA, or GCIH
  • Experience with EDR tools (CrowdStrike, Defender, SentinelOne, etc.)
  • Experience in cloud security monitoring (AWS, Azure, GCP)
  • Basic scripting knowledge (PowerShell, Python, Bash)

Key Skills

  • Strong analytical and problem-solving skills
  • Ability to work in 24/7 shift environment (if applicable)
  • Clear documentation and communication skills
  • Attention to detail
  • Ability to prioritize incidents based on risk

Work Environment

  • 24/7 rotational shifts (if applicable)
  • Fast-paced security operations environment
  • Collaboration with IT, network, and incident response teams

Job Opening ID

RRF_6512

Job Type

Permanent

Industry

IT Services

Date Opened

03/03/2026

City

Pune City

Province

Maharashtra

Country

India

Postal Code

411001

Want AI-powered job matching?

Upload your resume and get every job scored, your resume tailored, and hiring manager emails found - automatically.

Get Started Free