SOC Analyst

Publication Date:  Jan 6, 2026
Ref. No:  541474
Location: 

Mahape, Navi Mumbai, Maharasht, IN

About Atos Group

 

Atos Group is a global leader in digital transformation with c. 67,000 employees and annual revenue of c. €10 billion, operating in 61 countries under two brands — Atos for services and Eviden for products. European number one in cybersecurity, cloud and high performance computing, Atos Group is committed to a secure and decarbonized future and provides tailored AI-powered, end-to-end solutions for all industries. Atos Group is the brand under which Atos SE (Societas Europaea) operates. Atos SE is listed on Euronext Paris.

 

The purpose of Atos Group is to help design the future of the information space. Its expertise and services support the development of knowledge, education and research in a multicultural approach and contribute to the development of scientific and technological excellence. Across the world, the Group enables its customers and employees, and members of societies at large to live, work and develop sustainably, in a safe and secure information space.

 

About Eviden

 

Eviden is the Atos Group brand for hardware and software products with c. € 1 billion in revenue, operating in 36 countries and comprising four business units: advanced computing, cybersecurity products, mission-critical systems and vision AI. As a next-generation technology leader, Eviden offers a unique combination of hardware and software technologies for businesses, public sector and defense organizations and research institutions, helping them to create value out of their data. Bringing together more than 4,500 world-class talents and holding more than 2,100 patents, Eviden provides a strong portfolio of innovative and eco-efficient solutions in AI, computing, security, data and applications.

 

Location: Bangalore

 

Job Overview

We are seeking a skilled and motivated SOC Analyst to join our cybersecurity team in Bangalore. This full-time role focuses on real-time security monitoring, threat detection, incident response, and advanced threat analysis using the MITRE ATT&CK framework. The role is critical in ensuring proactive defense, rapid response, and continuous improvement of our security monitoring services.

 

Key Responsibilities

  • Monitor security logs in real time within the Security Operations Centre (SOC) from multiple network and security devices.

  • Ensure timely detection, notification, investigation, and containment of threats across customer environments.

  • Map observed adversary behaviors and incidents to relevant MITRE ATT&CK tactics and techniques for accurate threat classification.

  • Enrich incident investigations using the MITRE ATT&CK framework to identify attacker objectives and predict potential next steps.

  • Collaborate with Threat Intelligence teams to correlate Indicators of Compromise (IOCs) and Tactics, Techniques, and Procedures (TTPs) for proactive threat hunting.

  • Review and validate incidents to ensure adherence to standard operating procedures (SOPs).

  • Provide training, mentoring, and feedback to SOC analysts to improve quality of analysis and MITRE ATT&CK adoption.

  • Identify and implement continuous improvements in monitoring use cases, threat scenarios, and operational procedures.

  • Interact with customers to address queries and recommend service improvements.

  • Perform root cause analysis (RCA) for monitoring errors, service gaps, and security incidents.

  • Create weekly, monthly, and ad-hoc reports for clients and internal stakeholders.

  • Periodically tune detection rules to reduce false positives and enhance alert accuracy.

  • Collaborate with internal teams and external vendors during incident response and mitigation efforts.

  • Conduct detailed RCA for security incidents and provide containment and remediation recommendations.

  • Coordinate external audits and evidence collection related to SOC 2, SOX, NIST Cybersecurity Framework, and other compliance standards.

  • Stay current with emerging threats, attack techniques, and security technologies.

  • Track and manage key SOC KPIs and generate reports for core stakeholders.

 

Required Skills & Qualifications

  • Minimum 2 years of experience in a Security Operations Centre (SOC) or similar security operations role.

  • Strong technical and operational understanding of SOC processes and workflows.

  • Hands-on experience with SIEM platforms, including log ingestion, correlation, tuning, and analysis.

  • Solid understanding of networking concepts (OSI Model, TCP/IP) and operating systems.

  • Familiarity with security infrastructure components such as firewalls, proxies, WAFs, antivirus/EDR, and email gateways.

  • Good understanding of the Cyber Kill Chain and MITRE ATT&CK framework.

  • Ability to assist, guide, and mentor junior analysts with technical maturity and professionalism.

  • Strong verbal and written communication skills.

  • Excellent problem-solving and critical-thinking abilities.

  • Eagerness to learn and stay updated with the evolving cybersecurity landscape.

  • Strong interpersonal skills with the ability to collaborate effectively across teams and stakeholders.

 

Preferred Attributes (Nice to Have)

  • Experience with threat hunting and advanced incident analysis.

  • Exposure to compliance and audit requirements (SOC 2, SOX, NIST, ISO 27001).

  • Experience working in a 24x7 SOC environment.

 

 

 

 

Let’s grow together.