
Senior Security Analyst
Responsibilities
Qualifications & Requirements
Experience Level: Senior Level
Full Job Description
About the Role
Unisys is seeking a Senior Security Analyst for our AI Security Operations Center (SOC) in Bengaluru/Bangalore, India. In this role, you will be instrumental in developing and implementing advanced security controls to protect our company systems from cyber threats. You will ensure seamless deployment of security products, leverage automation through scripting and APIs for integrated security operations, and coordinate incident response activities.
What Success Looks Like:
- Develop and execute security controls, defenses, and countermeasures to intercept and prevent attacks or attempts to infiltrate company systems.
- Ensure the seamless deployment of security products across diverse environments and systems.
- Implement automation using scripting and APIs to integrate security products for orchestrated operations.
- Coordinate the handling and resolution of security incidents and manage the day-to-day operations and maintenance of security tools.
Qualifications for Success:
Required Qualifications:
- Experience: 2-3 years of hands-on experience in a Security Operations Center (SOC), Digital Forensics, or Incident Response role, demonstrating a solid understanding of operational security challenges and the incident lifecycle.
- Technical Proficiency:
- In-depth understanding and practical experience with Security Information and Event Management (SIEM) systems (e.g., Splunk, Google SecOps) for log analysis, sophisticated rule creation, and dashboard development.
- Strong knowledge of Endpoint Detection and Response (EDR) and Intrusion Detection/Prevention Systems (IDS/IPS).
- Proficiency in scripting languages (e.g., Python, PowerShell, Bash) for automation, data manipulation, and custom tool development.
- Solid understanding of network security, protocols, and traffic analysis.
- Familiarity with threat intelligence platforms and frameworks (e.g., MITRE ATT&CK) to inform detection strategy and rule development.
- Analytical and Problem-Solving Skills:
- Exceptional analytical skills to analyze large, complex datasets, identify subtle anomalies, patterns, and indicators of malicious activity.
- Demonstrated ability to think critically, troubleshoot complex problems, and make sound decisions under pressure, particularly during incident investigations.
- Collaboration and Communication:
- Strong verbal and written communication skills for reporting findings, documenting procedures, and collaborating effectively with cross-functional teams and external partners.
Preferred Qualifications:
- Experience working with Google SecOps, Cribl, audit logs, and cloud-native detection tools.
- Hands-on experience with Kubernetes incident response and forensic analysis.
- Familiarity with Detection-as-Code principles, version control (e.g., Git/GitHub), and CI/CD pipelines for detection rule management.
- Relevant security certifications (e.g., SANS, Offensive Security, cloud security certifications).
Unisys is committed to being an equal opportunity employer. We consider all qualified applicants without regard to age, blood type, caste, citizenship, color, disability, family medical history, family status, ethnicity, gender, gender expression, gender identity, genetic information, marital status, national origin, parental status, pregnancy, race, religion, sex, sexual orientation, transgender status, veteran status, or any other category protected by law.