SOC Analyst

Remote - India

Applications have closed

Zscaler

Zscaler is the leader in cybersecurity and zero trust digital transformation. Transform your IT and security needs with the best CASB and SASE solutions.

View company page

About Zscaler

Zscaler (NASDAQ: ZS) accelerates digital transformation so that customers can be more agile, efficient, resilient, and secure. The Zscaler Zero Trust Exchange is the company’s cloud-native platform that protects thousands of customers from cyberattacks and data loss by securely connecting users, devices, and applications in any location. 

With more than 10 years of experience developing, operating, and scaling the cloud, Zscaler serves thousands of enterprise customers around the world, including 450 of the Forbes Global 2000 organizations. In addition to protecting customers from damaging threats, such as ransomware and data exfiltration, it helps them slash costs, reduce complexity, and improve the user experience by eliminating stacks of latency-creating gateway appliances. 

Zscaler was founded in 2007 with a mission to make the cloud a safe place to do business and a more enjoyable experience for enterprise users. Zscaler’s purpose-built security platform puts a company’s defenses and controls where the connections occur—the internet—so that every connection is fast and secure, no matter how or where users connect or where their applications and workloads reside.

As a SOC Analyst at Zscaler, you will play a critical role in monitoring, detecting, and responding to security incidents to ensure the confidentiality, integrity, and availability of company systems and data. You will work closely with our experienced security professionals and gain hands-on experience in identifying and mitigating cybersecurity threats.
Key Responsibilities:
  • Security Monitoring: Continuously monitor security alerts and events to identify potential threats and vulnerabilities.
  • Incident Detection: Detect and analyze security incidents using various security tools and technologies.
  • Incident Response: Respond to security incidents promptly, following established procedures and protocols.
  • Threat Analysis: Conduct in-depth analysis of security events to determine the scope and impact of potential threats.
  • Threat Research: Review relevant intelligence, conduct threat hunting, high level malware analysis, and endpoint analysis to identify and evaluate threats.
  • Security Investigations: Investigate security incidents to gather evidence and facilitate incident resolution.
  • Security Documentation: Maintain accurate records of security incidents, investigations, and actions taken.
  • Security Tools: Utilize security information and event management (SIEM) tools, intrusion detection systems (IDS), and other security technologies effectively.
  • Automation: Create or update automation scripts to expand analysis capabilities or reduce level of effort.
  • Collaboration: Collaborate with other SOC team members, IT staff, and third-party vendors to resolve security incidents and enhance security posture.
  • Reporting: Prepare and deliver reports on security incidents, trends, and vulnerabilities to management and clients.
  • Continuous Improvement: Stay updated with the latest cybersecurity threats and industry trends, and suggest improvements to security processes and procedures.
Qualifications:
  • Bachelor's degree in cybersecurity, information technology, or a related field preferred.
  • 2+ years of experience working in a Security Operations Center (SOC) or related role.
  • Familiarity with security technologies, including SIEM, IDS/IPS, firewall, and antivirus.
  • Familiarity with network and endpoint fundamentals.
  • Scripting or programming experience in at least one language (Python, Powershell, C, C#, Java, etc.)
  • Knowledge of cybersecurity principles and best practices.
  • Strong analytical and problem-solving skills.
  • Excellent communication and teamwork skills.
  • Relevant certifications such as CompTIA Security+, Certified Information Systems Security Professional (CISSP), or Certified Information Security Manager (CISM) are a plus.
  • Ability to work in a fast-paced and high-pressure environment.

 

By applying for this role, you adhere to applicable laws, regulations, and Zscaler policies, including those related to security and privacy standards and guidelines.

Zscaler is proud to be an equal opportunity and affirmative action employer. We celebrate diversity and are committed to creating an inclusive environment for all of our employees. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex (including pregnancy or related medical conditions), age, national origin, sexual orientation, gender identity or expression, genetic information, disability status, protected veteran status or any other characteristics protected by federal, state, or local laws.

See more information by clicking on the Know Your Rights: Workplace Discrimination is Illegal link.

Pay Transparency

Zscaler complies with all applicable federal, state, and local pay transparency rules. For additional information about the federal requirements, click here.

Zscaler is committed to providing reasonable support (called accommodations or adjustments) in our recruiting processes for candidates who are differently abled, have long term conditions, mental health conditions or sincerely held religious beliefs, or who are neurodivergent or require pregnancy-related support.

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: Agile Antivirus Automation C CISM CISSP Cloud CompTIA Firewalls IDS Incident response Intrusion detection IPS Java Malware Monitoring PowerShell Privacy Python Scripting SIEM SOC Threat Research Vulnerabilities Zero Trust

Perks/benefits: Team events Transparency

Regions: Remote/Anywhere Asia/Pacific
Country: India
Job stats:  77  50  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.