Job Title:
SOC Analyst – Detection & Response | AIIR – AI-driven Incident Response
Company: AiiR Response
Location: Tirunelveli, Tamil Nadu
Created: 2025-09-04
Job Type: Full Time
Job Description:
Company Description AiiR Response Inc. is the first AI-driven breach response and extortion management platform, designed to automate negotiations, investigations, and recovery. Our platform, powered by our virtual analyst CEIRA, streamlines ransom negotiations, tracks cryptocurrency payments, conducts forensic investigations, and automates breach notifications. We help reduce costs, speed up response times, and ensure compliance for cyber insurers, enterprises, legal teams, and cybersecurity teams. Embrace the future of breach response with AiiR.Role Description This is a remote contract role for a SOC Analyst – Detection & Response. As a SOC Analyst, you will be responsible for monitoring security alerts and events, conducting threat hunting, analyzing threats, and responding to security incidents. You will work closely with cybersecurity and threat intelligence teams to enhance our detection and response capabilities.Qualifications Experience in Cyber Threat Hunting (CTH) and Cyber Threat Intelligence (CTI) Strong Analytical Skills and experience working in a Security Operations Center In-depth knowledge of Cybersecurity principles and practices Proactive problem-solving skills and ability to work independently Relevant certifications such as CISSP, CISM, or CEH are a plus Bachelor's degree in Cybersecurity, Information Technology, or related fieldResponsibilities Monitor SIEM/EDR platforms for security alerts and escalate confirmed incidents. Conduct first and second-line investigation of suspicious activity. Support forensic analysts with initial evidence collection and triage. Perform detection tuning and rule creation to reduce false positives. Carry out threat hunting exercises using IOCs and attacker TTPs. Contribute to incident reports and recommend preventive measures.Requirements 2–4 years SOC or IR experience. Familiarity withMicrosoft Sentinel, Splunk, Defender, CrowdStrike, or similar tools . Experience correlating SOC alerts with forensic investigations. Knowledge of MITRE ATT&CK and standard IR frameworks (NIST, ISO). Basic scripting knowledge for automating SOC tasks.