IN.JobDiagnosis logo

Job Title:

SOC Analyst – Detection & Response | AIIR – AI-driven Incident Response

Company: AiiR Response

Location: Tirunelveli, Tamil Nadu

Created: 2025-09-04

Job Type: Full Time

Job Description:

Company Description AiiR Response Inc. is the first AI-driven breach response and extortion management platform, designed to automate negotiations, investigations, and recovery. Our platform, powered by our virtual analyst CEIRA, streamlines ransom negotiations, tracks cryptocurrency payments, conducts forensic investigations, and automates breach notifications. We help reduce costs, speed up response times, and ensure compliance for cyber insurers, enterprises, legal teams, and cybersecurity teams. Embrace the future of breach response with AiiR.Role Description This is a remote contract role for a SOC Analyst – Detection & Response. As a SOC Analyst, you will be responsible for monitoring security alerts and events, conducting threat hunting, analyzing threats, and responding to security incidents. You will work closely with cybersecurity and threat intelligence teams to enhance our detection and response capabilities.Qualifications Experience in Cyber Threat Hunting (CTH) and Cyber Threat Intelligence (CTI) Strong Analytical Skills and experience working in a Security Operations Center In-depth knowledge of Cybersecurity principles and practices Proactive problem-solving skills and ability to work independently Relevant certifications such as CISSP, CISM, or CEH are a plus Bachelor's degree in Cybersecurity, Information Technology, or related fieldResponsibilities Monitor SIEM/EDR platforms for security alerts and escalate confirmed incidents. Conduct first and second-line investigation of suspicious activity. Support forensic analysts with initial evidence collection and triage. Perform detection tuning and rule creation to reduce false positives. Carry out threat hunting exercises using IOCs and attacker TTPs. Contribute to incident reports and recommend preventive measures.Requirements 2–4 years SOC or IR experience. Familiarity withMicrosoft Sentinel, Splunk, Defender, CrowdStrike, or similar tools . Experience correlating SOC alerts with forensic investigations. Knowledge of MITRE ATT&CK and standard IR frameworks (NIST, ISO). Basic scripting knowledge for automating SOC tasks.

Apply Now

➤
Home | Contact Us | Privacy Policy | Terms & Conditions | Unsubscribe | Popular Job Searches
Use of our Website constitutes acceptance of our Terms & Conditions and Privacy Policies.
Copyright © 2005 to 2025 [VHMnetwork LLC] All rights reserved. Design, Develop and Maintained by NextGen TechEdge Solutions Pvt. Ltd.