SOC Analyst
Remote - India
Zscaler
Zscaler is the leader in cybersecurity and zero trust digital transformation. Transform your IT and security needs with the best CASB and SASE solutions.About Zscaler
Zscaler (NASDAQ: ZS) accelerates digital transformation so that customers can be more agile, efficient, resilient, and secure. The Zscaler Zero Trust Exchange is the company’s cloud-native platform that protects thousands of customers from cyberattacks and data loss by securely connecting users, devices, and applications in any location.
With more than 10 years of experience developing, operating, and scaling the cloud, Zscaler serves thousands of enterprise customers around the world, including 450 of the Forbes Global 2000 organizations. In addition to protecting customers from damaging threats, such as ransomware and data exfiltration, it helps them slash costs, reduce complexity, and improve the user experience by eliminating stacks of latency-creating gateway appliances.
Zscaler was founded in 2007 with a mission to make the cloud a safe place to do business and a more enjoyable experience for enterprise users. Zscaler’s purpose-built security platform puts a company’s defenses and controls where the connections occur—the internet—so that every connection is fast and secure, no matter how or where users connect or where their applications and workloads reside.
As a SOC Analyst at Zscaler, you will play a critical role in monitoring, detecting, and responding to security incidents to ensure the confidentiality, integrity, and availability of company systems and data. You will work closely with our experienced security professionals and gain hands-on experience in identifying and mitigating cybersecurity threats.Key Responsibilities:
- Security Monitoring: Continuously monitor security alerts and events to identify potential threats and vulnerabilities.
- Incident Detection: Detect and analyze security incidents using various security tools and technologies.
- Incident Response: Respond to security incidents promptly, following established procedures and protocols.
- Threat Analysis: Conduct in-depth analysis of security events to determine the scope and impact of potential threats.
- Threat Research: Review relevant intelligence, conduct threat hunting, high level malware analysis, and endpoint analysis to identify and evaluate threats.
- Security Investigations: Investigate security incidents to gather evidence and facilitate incident resolution.
- Security Documentation: Maintain accurate records of security incidents, investigations, and actions taken.
- Security Tools: Utilize security information and event management (SIEM) tools, intrusion detection systems (IDS), and other security technologies effectively.
- Automation: Create or update automation scripts to expand analysis capabilities or reduce level of effort.
- Collaboration: Collaborate with other SOC team members, IT staff, and third-party vendors to resolve security incidents and enhance security posture.
- Reporting: Prepare and deliver reports on security incidents, trends, and vulnerabilities to management and clients.
- Continuous Improvement: Stay updated with the latest cybersecurity threats and industry trends, and suggest improvements to security processes and procedures.
- Bachelor's degree in cybersecurity, information technology, or a related field preferred.
- 2+ years of experience working in a Security Operations Center (SOC) or related role.
- Familiarity with security technologies, including SIEM, IDS/IPS, firewall, and antivirus.
- Familiarity with network and endpoint fundamentals.
- Scripting or programming experience in at least one language (Python, Powershell, C, C#, Java, etc.)
- Knowledge of cybersecurity principles and best practices.
- Strong analytical and problem-solving skills.
- Excellent communication and teamwork skills.
- Relevant certifications such as CompTIA Security+, Certified Information Systems Security Professional (CISSP), or Certified Information Security Manager (CISM) are a plus.
- Ability to work in a fast-paced and high-pressure environment.
By applying for this role, you adhere to applicable laws, regulations, and Zscaler policies, including those related to security and privacy standards and guidelines.
Zscaler is proud to be an equal opportunity and affirmative action employer. We celebrate diversity and are committed to creating an inclusive environment for all of our employees. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex (including pregnancy or related medical conditions), age, national origin, sexual orientation, gender identity or expression, genetic information, disability status, protected veteran status or any other characteristics protected by federal, state, or local laws.
See more information by clicking on the Know Your Rights: Workplace Discrimination is Illegal link.
Pay Transparency
Zscaler complies with all applicable federal, state, and local pay transparency rules. For additional information about the federal requirements, click here.
Zscaler is committed to providing reasonable support (called accommodations or adjustments) in our recruiting processes for candidates who are differently abled, have long term conditions, mental health conditions or sincerely held religious beliefs, or who are neurodivergent or require pregnancy-related support.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Agile Antivirus Automation C CISM CISSP Cloud CompTIA Firewalls IDS Incident response Intrusion detection IPS Java Malware Monitoring PowerShell Privacy Python Scripting SIEM SOC Threat Research Vulnerabilities Zero Trust
Perks/benefits: Team events Transparency
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Information Security Specialist jobs
- Open Senior Cyber Security Engineer jobs
- Open Ethical hacker / Pentester H/F jobs
- Open Information Systems Security Officer (ISSO) jobs
- Open Principal Security Engineer jobs
- Open Cyber Security Architect jobs
- Open Manager Pentest H/F jobs
- Open Product Security Engineer jobs
- Open Cyber Security Specialist jobs
- Open Staff Security Engineer jobs
- Open Senior Information Security Analyst jobs
- Open Cybersecurity Analyst jobs
- Open Chief Information Security Officer jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open IT Security Analyst jobs
- Open Consultant SOC / CERT H/F jobs
- Open Cybersecurity Consultant jobs
- Open Senior Information Security Engineer jobs
- Open Security Specialist jobs
- Open Senior Penetration Tester jobs
- Open Senior Security Architect jobs
- Open Cybersecurity Specialist jobs
- Open Security Researcher jobs
- Open IT Security Engineer jobs
- Open Sr. Security Engineer jobs
- Open CISM-related jobs
- Open Windows-related jobs
- Open Network security-related jobs
- Open ISO 27001-related jobs
- Open Pentesting-related jobs
- Open Application security-related jobs
- Open Agile-related jobs
- Open GCP-related jobs
- Open Vulnerability management-related jobs
- Open CISA-related jobs
- Open SaaS-related jobs
- Open Analytics-related jobs
- Open IAM-related jobs
- Open Threat intelligence-related jobs
- Open APIs-related jobs
- Open Security assessment-related jobs
- Open Java-related jobs
- Open Malware-related jobs
- Open Security Clearance-related jobs
- Open DevOps-related jobs
- Open IDS-related jobs
- Open Forensics-related jobs
- Open CEH-related jobs
- Open EDR-related jobs
- Open Kubernetes-related jobs