L1 SOC Analyst Job Openings in Bangalore, Chennai, Hyderabad & Kochi
UST has officially announced new openings for the position of L1 SOC Analyst. The recruitment drive is open for multiple locations — Bangalore, Chennai, Hyderabad, and Kochi. Candidates with a Graduate, Engineering, or Postgraduate qualification — freshers or experienced — are welcome to apply. Explore one of the best cybersecurity jobs for freshers in India, offering career growth and exposure to cutting-edge technologies in Security Operations Center (SOC) environments.
Company
Details
Θ Name of
the Company: UST
Θ Category:
Cybersecurity
Θ Work Type: Onsite
Θ Job Type: Full Time
Θ Salary: As per
company norms (competitive SOC Analyst salary in Bangalore)
Θ Job
Location:
Bangalore, Chennai, Hyderabad & Kochi
Θ Requisition
ID: —
About the
Role
UST
is seeking a detail-oriented and proactive L1 SOC Analyst to support 24x7
security monitoring and incident triage activities within our advanced Security
Operations Center. This role is ideal for professionals looking to grow in security
operations center careers, combining real-time threat detection, incident
response, and cyber defense responsibilities in a fast-paced environment.
Roles and
Responsibilities
- Perform 24x7 security threat monitoring using Sentinel Platform (mandatory) and OT platforms like Nozomi Networks (preferred).
- Execute structured, playbook-driven investigations and triage of security alerts.
- Conduct evidence collection and maintain accurate documentation for all incidents.
- Manage incident workflows, ensuring proper escalation to L2/L3 teams.
- Collaborate with third-party OT platform teams to resolve platform-specific alerts.
- Support incident containment, investigation, and remediation activities.
- Assist in enhancing detection logic and minimizing false positives through analysis.
Required
Skills & Qualifications
- Basic understanding of cybersecurity principles, threat analysis, and incident response workflows.
- Hands-on familiarity with SIEM monitoring tools and OT security platforms (Nozomi Networks preferred).
- Strong attention to detail with the ability to document investigation findings clearly.
- Excellent analytical and communication skills for effective incident triage.
- Ability to work in rotational shifts and collaborate with global security teams.
- Willingness to learn and grow within a dynamic cybersecurity environment.
Skill
Examples
- Experience using CDC SIEM and related platforms.
- Identifying use cases and suggesting process improvements.
- Strong logical reasoning and problem-solving for real-time incidents.
- Continuous learning about emerging cyber threats and technologies.
- Availability for rotating shifts and on-call schedules.
Knowledge
Examples
- 1–3 years of experience in SOC operations (preferred, not mandatory).
- Degree in Cybersecurity, Science, or Engineering with no backlogs.
- Knowledge of incident management, firewalls, network security, and ISMS/ISO27001 principles.
- Certifications such as Ethical Hacking, SIEM tools, or related cybersecurity credentials are desirable.
How to Apply
Apply Link –
Click Here
For Regular
Updates Join our WhatsApp – Click Here
For Regular Updates Join our Telegram – Click Here
Disclaimer: The details
provided here are intended solely for informational purposes for students,
freshers, and experienced candidates. All recruitment data is sourced from the
official UST careers page. Latest MNC Jobs neither charges any fee nor
guarantees placement. All hiring processes are conducted per company policies
and HR guidelines. We strongly advise applicants not to make any payments for
job opportunities.

0 Comments
Thanks for your comment, Will Reply shortly.