YipitData has announced new remote job openings for the role of SOC Analyst in India. This full-time work-from-home position is ideal for cybersecurity professionals with 2–4 years of experience in security operations, incident response, and threat analysis.
Job Overview
Name of the
Company:
YipitData
Job Role: SOC Analyst
Qualifications:
Graduate /
Post Graduate
Experience: 2–4 years
Salary: INR 10.3 –
19.5 LPA (via AmbitionBox— estimated based on similar roles)
Job
Location:
Work from Home - India (Remote – Full Time)
Job
Category:
Cyber Security
Requisition
ID: 7405070
Last Date: ASAP
Official
Website:
www.yipitdata.com
Job
Description
YipitData
is expanding its Security Operations Center and hiring a motivated SOC Analyst
to strengthen its global security posture. The role involves monitoring,
detecting, and responding to security threats across a modern cloud and SaaS
environment.
You
will analyze alerts, investigate incidents, collaborate with stakeholders, and
contribute to improving detection logic and response playbooks. This hands-on
role requires curiosity, initiative, and an interest in cloud security
monitoring, a rapidly growing discipline in 2025.
Your
contributions will support YipitData’s mission of maintaining strong
cybersecurity defenses as the company scales beyond 500+ employees worldwide.
Roles and
Responsibilities
- Monitor and triage security alerts from tools such as CrowdStrike, Google Workspace, Okta, and other EDR/SIEM platforms.
- Investigate suspicious activity across endpoints, identity systems, and SaaS applications.
- Collaborate with internal teams to contain, mitigate, and remediate incidents.
- Document investigation findings and contribute to root-cause analysis and post-incident reviews.
- Improve detection logic, tune noisy alerts, and reduce false positives.
- Contribute to security automation and enrichment workflows.
- Support proactive threat intelligence research and analysis.
- Assist with compliance documentation, audits, and evidence gathering.
- Build and maintain internal SOC documentation, SOPs, and response playbooks.
Required
Skills & Qualifications
- 2–4 years of hands-on experience in SOC operations, incident response, or technical security roles.
- Comfortable working with EDR, SIEM, IAM, and cloud-based monitoring platforms (e.g., CrowdStrike, Okta, DataDog).
- Strong analytical and forensic investigation skills.
- Knowledge of threat detection, phishing response, identity protection, and endpoint security.
- Ability to work effectively in a fast-paced, global, remote-first environment.
- Strong communication skills and ability to document incidents clearly.
- Proactive, curious mindset with a focus on automation and continuous improvement.
- Excellent teamwork and collaboration abilities.
Nice to Have
- Experience writing detection rules or scripting (Python, Bash, PowerShell).
- Familiarity with AWS security and compliance frameworks like SOC 2.
- Prior experience in a globally distributed or remote SOC team.
How to Apply
Apply Link –
Click Here
For Regular
Updates Join our WhatsApp – Click Here
For Regular Updates Join our Telegram – Click Here
Disclaimer: The information provided is for educational
and informational purposes only. All job details are sourced from official
company sites and verified platforms. Latest MNC Jobsdoes not guarantee job
placement and never charges fees for sharing job updates. Always apply only
through official links and follow the company’s recruitment process.

0 Comments
Thanks for your comment, Will Reply shortly.