×
Register Here to Apply for Jobs or Post Jobs. X

SOC Analyst – SIEM​/EDR; Microsoft Security Stack

Job in 641001, Coimbatore, Tamil Nadu, India
Listing for: Cubical Operations LLP
Full Time position
Listed on 2026-02-08
Job specializations:
  • IT/Tech
    Cybersecurity, Security Manager, Network Security
Job Description & How to Apply Below
Position: SOC Analyst – SIEM / EDR (Microsoft Security Stack)
Job Title

SOC Analyst – SIEM / EDR (Microsoft Security Stack)

Level

Senior Consultant / Consultant

Location

Coimbatore

Experience

2+ years of relevant SOC / Security Operations experience

Notice Period

Up to 30 days joiners only

Role Overview

We are looking for a SOC Analyst (SC/C level) with hands-on experience in SIEM and Endpoint Security, primarily within the Microsoft security ecosystem. The role involves real-time security monitoring, incident detection, investigation, and response across enterprise environments.

Key Responsibilities

SOC Operations & Monitoring

- Perform 24x7 security monitoring using SIEM tools, primarily Microsoft Sentinel
- Monitor, analyze, and triage security alerts from multiple sources (endpoints, network, cloud)
- Identify false positives and escalate genuine security incidents as per defined SOPs

Incident Detection & Response

- Investigate security incidents related to malware, phishing, ransomware, endpoint compromise, and suspicious user activity
- Execute incident response playbooks and containment actions
- Perform root cause analysis (RCA) and recommend remediation steps

Endpoint & Identity Security

- Manage and monitor Microsoft Defender for Endpoint
- Analyze endpoint alerts, suspicious processes, and attack timelines
- Support investigations related to Azure AD / Entra
-ins, conditional access, and identity threats

Reporting & Documentation

- Document incidents, investigations, and response actions
- Prepare daily / weekly SOC reports and incident summaries
- Support audits and compliance evidence related to SOC operations

Required Skills & Experience

Mandatory

- 2+ years of experience in SOC / Security Operations
- Hands-on experience with:
- Microsoft Sentinel (SIEM)
- Microsoft Defender for Endpoint (EDR)
- Good understanding of:
- Security alerts, logs, and event correlation
- Common attack vectors (phishing, malware, brute force, lateral movement)
- Basic understanding of Windows OS, networking, and security concepts
- Willingness to work in shift-based SOC environment

Good to Have

- Experience with other SIEM / EDR tools
- Exposure to MITRE ATT&CK framework
- Azure security or cloud security exposure
- SOC or security certifications (AZ-500, SC-200, CEH – optional)

Work Mode

- Onsite / Hybrid (as per business requirement)
Note that applications are not being accepted from your jurisdiction for this job currently via this jobsite. Candidate preferences are the decision of the Employer or Recruiting Agent, and are controlled by them alone.
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search:
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary