FD
Fulcrum Digitalfulcrumdigital.com

SOC Analyst

Pune, Maharashtra, IndiaFull-time2h ago

Who are we

Fulcrum Digital is an agile and next-generation digital accelerating company providing digital transformation and technology services right from ideation to implementation. These services have applicability across a variety of industries, including banking & financial services, insurance, retail, higher education, food, healthcare, and manufacturing.

Job Summary

We are seeking a proactive and detail-oriented SOC Analyst to join our Security Operations Center team. The SOC Analyst will monitor, detect, investigate, and respond to cybersecurity incidents to protect the organization’s systems, networks, and data. The ideal candidate has strong analytical skills and hands-on experience with security monitoring tools.

Key Responsibilities

Monitoring & Detection

  • Monitor security alerts and events from SIEM, EDR, IDS/IPS, firewalls, and other security tools

  • Analyze logs from servers, endpoints, cloud environments, and network devices

  • Identify suspicious activities and potential security threats

Incident Response

  • Investigate security incidents and determine severity and impact

  • Contain, eradicate, and recover from security incidents

  • Escalate complex incidents to senior analysts or incident response teams

  • Document incidents, actions taken, and resolution steps

Threat Intelligence & Analysis

  • Correlate threat intelligence with security alerts

  • Perform basic malware analysis and phishing investigations

  • Identify trends and recurring threats

Reporting & Documentation

  • Maintain accurate incident records and reports

  • Develop playbooks and standard operating procedures

  • Provide shift handover reports and status updates

Continuous Improvement

  • Assist in tuning SIEM rules to reduce false positives

  • Recommend improvements to detection and response capabilities

  • Participate in security drills and tabletop exercises

Required Qualifications

  • Bachelor’s degree in Cybersecurity, IT, Computer Science, or related field (or equivalent experience)

  • 1–3 years of Relevant experience in cybersecurity or SOC environment

  • Familiarity with SIEM tools (e.g., QRadar, Sentinel)

  • Understanding of networking fundamentals (TCP/IP, DNS, HTTP)

  • Knowledge of security concepts (malware, phishing, ransomware, MITRE ATT&CK)

Preferred Qualifications

  • Certifications such as Security+, CEH, CySA+, GCIA, or GCIH

  • Experience with EDR tools (CrowdStrike, Defender, SentinelOne, etc.)

  • Experience in cloud security monitoring (AWS, Azure, GCP)

  • Basic scripting knowledge (PowerShell, Python, Bash)

Key Skills

  • Strong analytical and problem-solving skills

  • Ability to work in 24/7 shift environment (if applicable)

  • Clear documentation and communication skills

  • Attention to detail

  • Ability to prioritize incidents based on risk

Work Environment

  • 24/7 rotational shifts (if applicable)

  • Fast-paced security operations environment

  • Collaboration with IT, network, and incident response teams