Skip to Main Content

Job Title


Security Operations Center Analyst


Company : People Prime Worldwide


Location : Aurangabad, Maharashtra


Created : 2025-12-21


Job Type : Full Time


Job Description

About Client:Our Client is a global IT services company headquartered in Southborough, Massachusetts, USA. Founded in 1996, with a revenue of $1.8B, with 35,000+ associates worldwide, specializes in digital engineering, and IT services company helping clients modernize their technology infrastructure, adopt cloud and AI solutions, and accelerate innovation. It partners with major firms in banking, healthcare, telecom, and media.Our Client is known for combining deep industry expertise with agile development practices, enabling scalable and cost-effective digital transformation. The company operates in over 50 locations across more than 25 countries, has delivery centers in Asia, Europe, and North America and is backed by Baring Private Equity Asia.Job Title: SOC Analyst – Level 2 (L2)Key Skills: SOC Analyst (L2), Security Monitoring, SIEM, Alert Analysis, Incident Triage, Threat Intelligence, Rule Tuning, Incident Response Procedures, Security Operations, Shift Handover / SOC OperationsJob Locations: NoidaExperience: 3 – 6 YearsBudget: 8LPAMode of Work: Work from OfficeRotational Shifts: YesEducation Qualification: Any GraduationJob Description: The Level two (L2) SOC Analyst is responsible for monitoring security alerts, performing initial analysis, documenting incidents, and escalating security events according to defined procedures. The role supports SOC operations, metrics tracking, and continuous improvement activities.Key ResponsibilitiesMonitor and triage security alerts using SIEM and security tools.Escalate incidents based on established response procedures.Participate in rule tuning, use case, and response procedure workshops.Attend shift meetings and perform shift handover/turnover.Record key SOC metrics including response time, handle time, and quality.Review threat intelligence briefs and apply insights during analysis.Maintain incident documentation and case notes.Participate in training, lessons learned, and skills development activities.Review Incident Response Procedures by Threat Categories.Review threat intelligence briefsMaintain and manage skills development plansProvides feedback on quality of SA assessment to L1 Monitoring team Lessons Learned reviewsRequirementsBasic knowledge of cybersecurity concepts and incident response.Familiarity with SIEM tools and security monitoring.Good analytical, communication, and documentation skills.Ability to work in a 24x7 shift environment.Interested Candidates please share your CV to akhila.vadla@