ARCHIVED
This job listing has been archived and is no longer accepting applications.
MisuJob - AI Job Search Platform MisuJob

SOC Analyst II, Information Security

Saviynt

Bengaluru Hybrid permanent

Posted: December 4, 2025

Interested in this position?

Create a free account to apply with AI-powered matching

Job Description

Saviynt is an identity authority platform built to power and protect the world at work. In a world of digital transformation, where organizations are faced with increasing cyber risk but cannot afford defensive measures to slow down progress, Saviynt’s Enterprise Identity Cloud gives customers unparalleled visibility, control and intelligence to better defend against threats while empowering users with right-time, right-level access to the digital technologies and tools they need to do their best work.

We are building a next-generation Security Operations Center (SOC) designed for the cloud-first era. We are moving beyond traditional reactive methods to build an intelligent, automated SOC that leverages deep cloud security expertise to stop advanced threats.
We are seeking a motivated and detail-oriented L2 SOC Analyst to be a core member of our 24/7 operations team. This role is for a hands-on analyst who excels at investigating complex alerts, using automation to accelerate response, and is passionate about cloud security. You will be the primary line of in-depth analysis, working to validate, investigate, and contain threats as
they are escalated from L1.
Please note: This is a 24/7 operational role. The SOC team works in three rotating shifts
(morning, afternoon, and night) to ensure continuous monitoring and response.


WHAT YOU WILL BE DOING:

• Incident Triage & Investigation
• Serve as the primary escalation point for alerts triaged by L1 analysts and automated systems.
• Conduct detailed analysis of security alerts from a wide range of sources (SIEM, EDR, CSPM, Cloud-native tools) to validate threats and determine their scope.
• Investigate security incidents in our enterprise and cloud environments (AWS, Azure, GCP), correlating data to build a complete picture of attacker activity.
• Perform deep-dive analysis of logs, network packets, and endpoint data to identify indicators of compromise (IOCs).

• Incident Response & Automation
• Execute and tune automated response playbooks using our SOAR platform for common security incidents.
• Perform timely incident response actions, such as isolating compromised hosts, blocking malicious IPs/domains, and disabling compromised accounts.
• Utilize and modify existing scripts (primarily Python) to assist with automated evidence collection and enrichment.
• Document all investigation steps, findings, and containment actions in our incident management system.

• Threat Hunting & Cloud Monitoring
• Participate in "guided" threat hunting campaigns based on new threat intelligence or hypotheses developed by senior analysts.
• Actively monitor and analyze security logs from cloud-native tools (e.g., AWS GuardDuty, CloudTrail,Cloudflare, Azure,etc.).
• Assist in tuning detection rules and identifying false positives to help improve the fidelity of our security alerts.

• Continuous Improvement & Collaboration
• Escalate complex, high-severity, or unresolved incidents to L3 Analysts and the Incident
• Response team with detailed handover notes.
• Contribute to the refinement of SOC documentation, including Standard Operating Procedures (SOPs) and investigation runbooks.
• Provide guidance and mentorship to L1 analysts on triage techniques and alert analysis.


What You Bring:

• Bachelor’s degree in Computer Science, Information Security, or a related field, or equivalent practical experience.
• Willingness and ability to work in a 24/7 rotational shift environment (morning, afternoon, and night).
• 4-6 years of experience in a Security Operations (SOC) environment, with demonstrated L2 capabilities.
• Cloud Security Experience: Hands-on experience monitoring and responding to alerts in at least one major cloud provider (AWS, Azure, or GCP).
• Technical Expertise: Strong, hands-on experience with SIEM (e.g., Splunk, QRadar, Azure Sentinel) and EDR (e.g., CrowdStrike, SentinelOne) platforms.
• Automation Familiarity: Experience using a SOAR platform and familiarity with scripting (Python preferred) for basic automation or analysis tasks.
• Strong working knowledge of the MITRE ATT&CK framework and its application to incident analysis.


Why Join Us:

• Be at the forefront of a modern, cloud-focused Security Operations Center.
• Gain deep, hands-on experience with cutting-edge cloud security, automation, and threat intelligence technologies.
• A clear career path for growth into L3, threat hunting, or automation engineering roles.
• Collaborate with world-class security and engineering leaders in a high-impact, operational role.

Why Apply Through MisuJob?

AI-Powered Job Matching: MisuJob uses advanced artificial intelligence to analyze your skills, experience, and career goals. Our matching algorithm compares your profile against thousands of job requirements to find positions where you have the highest chance of success. This saves you hours of manual job searching and ensures you only see relevant opportunities.

One-Click Applications: Once you create your profile, applying to jobs is effortless. Your resume and cover letter are automatically tailored to highlight the most relevant experience for each position. You can apply to multiple jobs in minutes, not hours.

Career Intelligence: Beyond job matching, MisuJob provides valuable career insights. See how your skills compare to market demands, identify skill gaps to address, and understand salary benchmarks for your experience level. Make data-driven decisions about your career path.

Frequently Asked Questions

How do I apply for this position?

Click the "Register to Apply" button above to create a free MisuJob account. Once registered, you can apply with one click and track your application status in your dashboard.

Is MisuJob free for job seekers?

Yes, MisuJob is completely free for job seekers. Create your profile, get matched with jobs, and apply without any cost. We help you find your dream job without any hidden fees.

How does AI matching work?

Our AI analyzes your resume, skills, and experience to understand your professional profile. It then compares this against job requirements using natural language processing to calculate a match percentage. Higher matches mean better fit for the role.

Can I apply to jobs in other countries?

Absolutely. MisuJob features jobs from companies worldwide, including remote positions. Filter by location or look for remote opportunities to find jobs that match your preferences.

Ready to Apply?

Join thousands of job seekers using MisuJob's AI to find and apply to their dream jobs automatically.

Register to Apply