Who are we
Fulcrum Digital is an agile and next-generation digital accelerating company providing digital transformation and technology services right from ideation to implementation. These services have applicability across a variety of industries, including banking & financial services, insurance, retail, higher education, food, healthcare, and manufacturing.
We are seeking a proactive and detail-oriented SOC Analyst to join our Security Operations Center team. The SOC Analyst will monitor, detect, investigate, and respond to cybersecurity incidents to protect the organization’s systems, networks, and data. The ideal candidate has strong analytical skills and hands-on experience with security monitoring tools.
Key Responsibilities
Monitoring & Detection
Monitor security alerts and events from SIEM, EDR, IDS/IPS, firewalls, and other security tools
Analyze logs from servers, endpoints, cloud environments, and network devices
Identify suspicious activities and potential security threats
Incident Response
Investigate security incidents and determine severity and impact
Contain, eradicate, and recover from security incidents
Escalate complex incidents to senior analysts or incident response teams
Document incidents, actions taken, and resolution steps
Threat Intelligence & Analysis
Correlate threat intelligence with security alerts
Perform basic malware analysis and phishing investigations
Identify trends and recurring threats
Reporting & Documentation
Maintain accurate incident records and reports
Develop playbooks and standard operating procedures
Provide shift handover reports and status updates
Continuous Improvement
Assist in tuning SIEM rules to reduce false positives
Recommend improvements to detection and response capabilities
Participate in security drills and tabletop exercises
Required Qualifications
Bachelor’s degree in Cybersecurity, IT, Computer Science, or related field (or equivalent experience)
1–3 years of Relevant experience in cybersecurity or SOC environment
Familiarity with SIEM tools (e.g., QRadar, Sentinel)
Understanding of networking fundamentals (TCP/IP, DNS, HTTP)
Knowledge of security concepts (malware, phishing, ransomware, MITRE ATT&CK)
Preferred Qualifications
Certifications such as Security+, CEH, CySA+, GCIA, or GCIH
Experience with EDR tools (CrowdStrike, Defender, SentinelOne, etc.)
Experience in cloud security monitoring (AWS, Azure, GCP)
Basic scripting knowledge (PowerShell, Python, Bash)
Key Skills
Strong analytical and problem-solving skills
Ability to work in 24/7 shift environment (if applicable)
Clear documentation and communication skills
Attention to detail
Ability to prioritize incidents based on risk
Work Environment
24/7 rotational shifts (if applicable)
Fast-paced security operations environment
Collaboration with IT, network, and incident response teams