IT Cyber Defense Analyst

Posted: Tuesday, 20 January 2026
Valid Thru: Thursday, 19 February 2026
Index Requested on: 01/20/2026 07:51:03
Indexed on: 01/20/2026 07:51:03

Location: Mumbai, MH, , IN

Industry: Advertising and Public Relations
Occupational Category: 33-3000.00 - Protective Service
Type of Employment: FULL_TIME

Altera Digital Health (India) LLP is hiring!

Description:

Job Description: IT Cyber Defense Analyst – P2

Location: Remote (Pune-Baroda, India)

Department: IT Cybersecurity / Security Operations Centre (SOC)

Reports To: SOC Manager

About the Role

The SOC IT Cyber Defense Analyst is responsible for real-time security monitoring, alert triage, and initial investigation of security events across enterprise environments. This role serves as the first line of defense, ensuring timely detection, analysis, escalation, and documentation of potential security incidents while maintaining operational excellence in a 24/7 SOC environment.

Key Responsibilities

Security Monitoring & Alert Triage

  • Monitor security alerts from multiple platforms including SIEM, EDR/XDR, SOAR, IDS/IPS, Email Security, and Cloud Security tools
  • Perform initial triage and analysis of alerts to determine severity, impact, and validity
  • Identify false positives, benign events, and potential security incidents

Incident Handling & Investigation

  • Conduct Level 1 investigation of security incidents such as:
    • Phishing and Email-based threats
    • Malware, ransomware, and suspicious file activity
    • Endpoint, network, and account anomalies
    • Unauthorized access attempts and policy violations
  • Collect and analyze logs, artifacts, and indicators (IPs, URLs, hashes, domains)
  • Document findings clearly and accurately in incident tickets and SOC communication channels

Escalation & Coordination

  • Escalate confirmed or high-risk incidents to L2/L3 analysts or Incident Response teams as per defined runbooks
  • Follow standard operating procedures (SOPs) and escalation matrices
  • Coordinate with IT, Desktop, Network, Cloud, and Application teams when required

Communication & Reporting

  • Provide clear, concise, and timely updates during incident handling
  • Participate in shift handovers, ensuring continuity and proper knowledge transfer
  • Maintain accurate incident timelines, actions taken, and next steps

Compliance & Process Adherence

  • Adhere to SOC policies, security standards, and compliance requirements
  • Ensure proper handling of sensitive information and evidence
  • Follow approved WFH / on-site operational standards, including workstation and monitoring setup

Continuous Improvement

  • Actively participate in training, tabletop exercises, and knowledge-sharing sessions
  • Stay updated on latest threats, attack techniques, and security trends
  • Provide feedback to improve SOC processes, detection rules, and playbooks

Required Skills & Qualifications

Technical Skills

  • Basic understanding of:
    • Networking concepts (TCP/IP, DNS, HTTP/S, VPN)
    • Operating Systems (Windows, Linux fundamentals)
    • Cybersecurity concepts (malware, phishing, brute force, MITRE ATT& CK)
  • Hands-on exposure or familiarity with:
    • SIEM tools (e.g., Splunk, Sentinel, QRadar, Elastic)
    • EDR/XDR platforms (Defender, CrowdStrike, SentinelOne, etc.)
    • Email security and phishing analysis
  • Ability to analyze logs, alerts, and security events

Soft Skills

  • Strong analytical and problem-solving skills
  • Clear written and verbal communication skills
  • Ability to work under pressure in a 24/7 operational environment
  • High level of integrity, accountability, and attention to detail
  • Willingness to work in rotational including night shifts

Education & Experience

  • Bachelor’s degree in computer science, Information Security, IT, or related field
  • Minimum 2+ years of experience in SOC, IT Security, or related technical roles

Preferred Certifications (Good to Have)

  • CompTIA Security+
  • CEH (Certified Ethical Hacker)
  • Microsoft SC-200 / SC-900
  • Any SIEM or EDR vendor-specific certification

Work Environment & Expectations

  • 24/7 rotational shift model, including nights, weekends, and holidays
  • High-responsibility role requiring continuous monitoring and rapid response
  • Must comply with SOC operational standards, including approved workstation and monitoring setup

Career Growth

  • Opportunity to progress to SOC Analyst L2 / L3, Incident Responder, Threat Hunter, or Detection Engineer roles based on performance and skill development

Responsibilities:

Please review the job description.

Educational requirements:

  • high school

Desired Skills:

Please see the job description for required or recommended skills.

Benefits:

Please see the job description for benefits.

Apply Now