SOC Analyst Job Openings in Bangalore / Mumbai 2026!!!
Kroll announced job vacancy for the post of SOC Analyst. The place of posting will be at Bangalore / Mumbai (Hybrid). Candidates who have completed Graduate / Engineering / Post Graduate with Fresher / Experience are eligible to apply. More details about qualifications, job description and roles & responsibilities are as follows
Company
Overview
|
Name of the Company |
Kroll |
|
Required Qualifications |
Graduate |
|
Skills |
Understanding of cybersecurity frameworks |
|
Category |
Cybersecurity |
|
Work Type |
Hybrid |
As
a SOC Analyst supporting one of their client engagements, you will be
responsible for monitoring, analysing, and resolving security-related tickets
as part of a dedicated 16x5 Security Operations Centre. This role is critical
to ensuring timely triage and resolution of incidents, maintaining compliance
with their client’s security standards, and supporting continuous improvement
of detection and response capabilities.
Job Details
Θ Positions: SOC Analyst
Θ Job
Location:
Bangalore / Mumbai (Hybrid)
Θ Salary: As per
company standards
Θ Job Type: Full Time
Θ Requisition
ID: 21013532
Roles and
Responsibilities:
- Ticket Analysis & Resolution: Review, investigate, and resolve security tickets raised through our client’s monitoring systems and service desk workflows.
- Alert Triage: Prioritise and categorise alerts based on severity, impact, and relevance to our client’s threat landscape.
- Incident Documentation: Maintain accurate and detailed records of investigations, actions taken, and resolution outcomes in our client’s ticketing system.
- Collaboration: Work closely with our client’s internal teams, including infrastructure, application, and compliance teams, to ensure coordinated incident handling.
- Playbook Execution: Follow and refine client-specific response playbooks and standard operating procedures (SOPs).
- Shift Handover: Ensure clear and complete handover documentation between shifts to maintain continuity of operations.
Required
Skills & Qualifications:
- 1–3 years of experience in a SOC or cybersecurity operations role.
- Familiarity with SIEM platforms (e.g., Microsoft Sentinel, LogRhythm), ticketing systems (e.g., ServiceNow, Xurrent), and endpoint protection tools (e.g., Microsoft Defender, SentinelOne).
- Experience supporting and resolving common SOC playbook scenarios (e.g., phishing emails, Windows/Linux malware, Microsoft 365/Entra ID account compromise)
- Strong analytical skills and attention to detail in reviewing logs, alerts, and incident data.
- Understanding of cybersecurity frameworks such as MITRE ATT&CK and NIST.
- Excellent written and verbal communication skills for documenting incidents and collaborating with stakeholders.
- Bachelor’s degree in Computer Science, Information Security, or a related field.
Preferred
Certifications
- CompTIA Security+, CEH, or Microsoft SC-200.
- ITIL Foundation (for understanding ticketing and service workflows).
Apply Link –
Click Here
For Regular
Updates Join our WhatsApp – Click Here
For Regular Updates Join our Telegram – Click Here
Disclaimer:
The
information provided on this page is intended solely for informational purposes
for Students, Freshers & Experience candidates. All the recruitment details
are sourced directly from the official website and pages of the respective
company. Latest MNC Jobs do not guarantee job placement, and the recruitment
process will follow the company’s official rules and Human Resource guidelines.
Latest MNC Jobs do not charge any fees for sharing job information. Latest MNC
Jobs strongly advise Students, Freshers & Experience candidates not to make
any payments for any job opportunities.

0 Comments
Thanks for your comment, Will Reply shortly.