JG

SOC Analyst II

Bengaluru, Karnataka, IndiaFull-time7h ago
SOC Analyst II

About Junglee Games:

Junglee Games is part of Flutter Entertainment, the world’s leading iGaming and sports entertainment group listed on the New York Stock Exchange (NYSE: FLUT). We operate independently in India while leveraging Flutter’s global expertise across product, technology, and responsible gaming.

Junglee Games is a technology-led entertainment powerhouse building safe, intelligent, and immersive gaming ecosystems that delight millions daily. Founded in San Francisco in 2012, we are revolutionizing the player experience by treating trust, safety, and fairness as engineering priorities. We specialize in building scalable platforms across a diverse portfolio of competitive and social genres including Ludo, Carrom, Solitaire, Rummy, Poker, Teen Patti, Pool, Quizzes and Tamboola.

By marrying tech and deep data science with a passion for community, we have turned technology into our unfair advantage. Our focus on platform thinking allows us to deliver seamless, responsible, and culturally relevant experiences at a global scale.


Joining Junglee Games means working at the intersection of India’s fast-growing gaming ecosystem and joining Flutter Entertainment’s global talent community, shaping the future of digital entertainment. Beyond gaming, Junglee Games represents a culture defined by technological ingenuity and strong values. We are committed to shaping the next generation of responsible leaders and redefining what it means to be a tech-first entertainment leader in a digital-first world.

Position Overview

The SOC Analyst is the frontline defender of our organisation’s digital assets. In this role, you are responsible for the continuous monitoring of our security ecosystem, identifying potential threats in real-time, and performing the initial triage of security events.

You will work within a fast-paced environment, using a variety of advanced tools to investigate suspicious activity and escalate high-risk incidents to senior responders. The ideal candidate is a detail-oriented problem solver with a foundational understanding of network protocols, operating systems, and common attack vectors, driven by a desire to stay one step ahead of cyber adversaries.

Responsibilities

  • Monitor security consoles and SIEM dashboards 24/7 (Roaster) to identify, categorise, and prioritise security alerts.

  • Perform initial triage and deep-dive analysis of security events to determine if they are false positives or legitimate threats.

  • Conduct log analysis across various sources, including firewalls, web proxies, EDR tools, and email gateways, to reconstruct attack timelines.

  • Respond to and contain security incidents such as malware infections, phishing attempts, and unauthorised access requests.

  • Assist in the containment of compromised hosts and accounts by disabling credentials or isolating endpoints from the network.

  • Document all investigative steps, findings, and remediation actions clearly within the ticketing system for audit and compliance purposes.

  • Analyze suspicious emails and URLs reported by users to identify phishing campaigns and credential harvesting attempts.

  • Research emerging threats, vulnerabilities, and "Zero Day" exploits to understand how they might impact the organisation’s environment.

  • Support the maintenance and health monitoring of security tools to ensure consistent visibility across the network.

  • Participate in regular training and tabletop exercises to improve response times and technical proficiency.

  • Contribute to the creation and refinement of standard operating procedures (SOPs) and response playbooks.

Requirements

  • 3+ years of experience working in a 24/7 SOC(Shift Work) environment

  • Proficiency with SIEM platforms to monitor dashboards, run search queries, and filter through high volumes of log data.

  • Solid understanding of Network Protocols (TCP/IP, DNS, HTTP/S, SMTP) and the ability to interpret traffic patterns and packet captures (PCAP) to identify anomalies.

  • Hands-on experience with EDR and Antivirus tools (e.g., CrowdStrike, SentinelOne, or Microsoft Defender) for endpoint investigation and threat containment.

  • Knowledge of Common Attack Vectors and the ability to map suspicious activity to stages of the Cyber Kill Chain or the MITRE ATT&CK framework.

  • Experience with Email Security Gateways and manual analysis of email headers, attachments, and URLs to identify phishing and business email compromise (BEC) attempts.

  • Familiarity with Operating System Internals (Windows, Linux, and macOS), specifically regarding common persistence mechanisms, registry changes, and process execution.

  • Ability to perform basic Log Analysis across diverse sources, including firewalls, VPNs, web proxies, and cloud audit logs (AWS CloudTrail, Azure Activity Logs).

  • Strong documentation habits, with the ability to write clear, concise technical summaries of investigations within a ticketing system like Jira).

  • Basic Scripting skills (Python, PowerShell, or Bash) are highly preferred to assist with data parsing or minor task automation.

  • Adaptability for Shift Work, including the ability to work nights, weekends, and holidays as part of a rotating 24/7 coverage schedule.

  • Critical thinking and problem-solving skills, with the discipline to follow Standard Operating Procedures (SOPs) while identifying when an incident requires immediate escalation.