Senior SOC Analyst, Alerts & Automation

Bangalore

Circles

Discover how Circles transforms telcos into techcos, ensuring top consumer choice and industry-leading margins. Learn how we innovate and excel!

View all jobs at Circles

Apply now Apply later

Role: Senior SOC Analyst, Alerts & Automation

Standard Title: Senior Analyst, (Cyber Defence - SOC)

Location: Bangalore, India 

About Circles

Founded in 2014, Circles is a global technology company reimagining the telco industry with its SaaS platform, helping telco operators launch and operate successful digital brands. Today, Circles is partnering with operators in 14 countries across 6 continents with the mission to deliver digital experiences to millions of people through our businesses.

With Circles.Life, our digital lifestyle brand established in Singapore, we empower and delight customers by offering digital experiences that go beyond traditional telco services. Circles.Life  is powered by the same SaaS platform and go-to-market strategies developed by Circles, serving as a market-leading example of digital innovation and the future of telco. Circles.Life has earned numerous accolades over the years, including "Best Use of MarTech" at the CX Asia Excellence Awards and #1 in Singapore's Best Customer Service Award.

Circles is backed by global investors such as Peak XV Partners (formerly Sequoia), Warburg Pincus, EDBI, and Founders Fund – renowned institutions with a track record of backing industry-shaking innovators.

What You'll Do

As a Security Incident and SIEM Specialist, you will support Circle’s SOC team in areas such as cybersecurity incident response, SIEM alert creation, fine-tuning, and noise reduction. Your role includes managing threat intelligence, monitoring security events, investigating incidents, performing forensic analysis, and coordinating global incident response efforts. You will play a key role in enhancing SOC monitoring capabilities by optimizing alert quality and reducing false positives, thereby improving overall SOC efficiency and productivity.

What We’re Looking For:

  • Bachelor's degree in Computer Science, Engineering, or related field (or equivalent experience).
  • 2+ years of hands-on SOC or information security experience in a global IT environment.
  • Experience with SIEM tools (Graylog, Splunk, ELK, Rapid7, LogRhythm, QRadar).
  • Relevant certifications (GCIH, GCIA, Splunk/QRadar) are a plus.

Key Responsibilities:

  • Triage and analyze security alerts, assess threats, and prioritize based on risk and impact.
  • Execute incident response procedures and document findings clearly.
  • Distinguish false positives from real threats using SIEM and security tools.
  • Understand common attack vectors, TTPs, and apply contextual log analysis.
  • Collaborate with cross-functional teams to ensure effective incident response.
  • Stay updated on emerging threats and security trends.

SIEM & Scripting:

  • Strong UNIX/Linux skills and proficiency in Bash or Python scripting.
  • Skilled in RegEx, log parsing, pipeline creation, and data normalization.
  • Experience in SIEM tuning, use case development, and alert optimization.
  • Familiar with building and enhancing detection rules and threat analytics.
  • Exposure to AI/ML for noise reduction and threat detection is a plus.

Other Requirements:

  • Willingness to work in a hybrid setup and 24x7 environment.

 

To all recruitment agencies: Circles will only acknowledge resumes shared by recruitment agencies if selected in our preferred supplier partnership program.

Please do not forward resumes to our jobs alias, Circles employees or any other company location. Circles will not be held accountable for any fees related to unsolicited resumes not uploaded via our ATS.

Circles is committed to a diverse and inclusive workplace. We are an equal opportunity employer and do not discriminate on the basis of race, national origin, gender, disability or age.

Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  0  0  0

Tags: Analytics Automation Bash Computer Science ELK GCIA GCIH Incident response Linux Log analysis LogRhythm Monitoring Python QRadar SaaS Scripting SIEM SOC Splunk Threat detection Threat intelligence TTPs UNIX

Perks/benefits: Team events

Region: Asia/Pacific
Country: India

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.