Skip to Main Content

Job Title


Security Operations Center Analyst


Company : va2pt.com


Location : Dwarka, Delhi


Created : 2025-07-12


Job Type : Full Time


Job Description

Job Title: SOC Analyst Location : Onsite – Dwarka, Delhi Job Type : Full-Time Experience : 1+ years in Security Operations / Threat Monitoring Preferred Certification : CEH, CompTIA Security+, or equivalent About Us We are a cybersecurity-driven organization focused on protecting digital infrastructure for clients across industries. Our Security Operations Center (SOC) is the nerve center of our threat detection and response capabilities. We are expanding our team to onboard professionals committed to proactive defense and continuous monitoring. Job Summary We are looking for a SOC Analyst to join our onsite team in Dwarka . The ideal candidate will have at least 1 year of experience in a security monitoring or analyst role and be familiar with SIEM tools , incident triage, and basic threat detection techniques. Key Responsibilities Monitor security alerts and logs from firewalls, IDS/IPS, endpoints, and SIEM tools Analyze suspicious activity and escalate incidents as per defined workflows Triage, investigate, and document security incidents Perform basic threat hunting and support deeper investigations Assist in tuning SIEM rules and reducing false positives Collaborate with internal teams for remediation and reporting Stay up-to-date with current threats, IOCs, and SOC procedures Support creation of playbooks and response templates Required Skills & Qualifications 1+ years of experience in a Security Operations or similar analyst role Hands-on experience with SIEM platforms (e.g., Splunk, ELK, Wazuh, or QRadar) Understanding of TCP/IP, network traffic analysis, and security log analysis Basic understanding of attack techniques (MITRE ATT&CK, phishing, malware behavior) Strong documentation and communication skills Willingness to work in rotating shifts (if applicable) Preferred (Nice to Have) Certifications: CEH, CompTIA Security+, CySA+, or equivalent Familiarity with EDR/XDR platforms (e.g., CrowdStrike, SentinelOne) Basic scripting skills (Python, Bash, PowerShell) Exposure to cloud security monitoring (AWS, Azure) What We Offer Hands-on exposure to real-world security operations Learning & development support with certifications Collaborative and security-focused team environment Growth into Tier 2/3 roles within SOC and Threat Intel