SOC L1 Analyst – Bangalore – 1 to 5 Years Experience

Urgent
Apply Now

Job Description

Network Intelligence is seeking a passionate and driven Level 1 SOC Analyst to strengthen our Security Operations team. The ideal candidate will have hands-on experience with key security tools such as Splunk, Azure Sentinel, and Microsoft Defender. This is a fantastic opportunity to grow your cybersecurity career in a dynamic and collaborative environment.

Responsibilities:

  • Monitor, analyze, and respond to security events and incidents
  • Utilize SIEM tools like Splunk and Azure Sentinel for event correlation and threat detection
  • Investigate and escalate incidents following operational guidelines
  • Document incident reports and maintain accurate logs
  • Work closely with senior SOC analysts and security teams for case management
Job Requirements

• Minimum 1 year of experience working in a SOC environment
• Strong experience with Splunk (Mandatory), Azure Sentinel, and Microsoft Defender
• Good understanding of SIEM and cybersecurity fundamentals
• Ability to work in shifts and under pressure

Preferred Qualifications

• Immediate joiners or candidates with a notice period of 30 days or less will be preferred
• Additional knowledge of other SIEM platforms and cybersecurity certifications is a plus
• To Apply: Send your updated resume
• Subject line of the email should be: "Application for SOC L1".

About the Company

Network Intelligence is a global cybersecurity services provider committed to helping organizations build and maintain resilient cybersecurity defenses. Our focus is on delivering top-notch security solutions and fostering a supportive, dynamic work culture. Join us and be part of a team that's making an impact in the security world!