Security Operations Center (SOC) Analyst jobs in Qatar

May 16, 2025

Job Description

Tech Mahindra is looking for an experienced and proactive Security Operations Center (SOC) Analyst to join our cybersecurity team. This role is crucial in ensuring enterprise-level security monitoring, incident detection, and response using cutting-edge tools and platforms like Microsoft Sentinel and Defender XDR. If you have a passion for cybersecurity, strong analytical skills, and proven experience in SOC operations, we invite you to apply.

Advertisement

About Company:

Tech Mahindra is a leading global provider of digital transformation, consulting, and business reengineering services. With over 150,000 professionals across 90 countries, we deliver end-to-end technology solutions to our clients worldwide. Our cybersecurity division is at the forefront of protecting digital assets and ensuring business continuity for global enterprises.

Responsibilities for Security Operations Center (SOC) Analyst:

The responsibilities for the job of Security Operations Center (SOC) Analysts are as following.

  • Provide Level 2 (L2) support for SOC operations, including advanced threat analysis and incident resolution
  • Monitor and investigate security alerts generated by Microsoft Sentinel and Defender XDR
  • Utilize KQL (Kusto Query Language) for deep-dive analysis in Azure Log Analytics
  • Respond to cybersecurity incidents in real-time, ensuring timely escalation and resolution
  • Perform threat hunting and proactive investigation of anomalies in SIEM data
  • Collaborate with cross-functional teams to enhance threat detection and response capabilities
  • Create, tune, and optimize detection rules in Microsoft Sentinel and other security tools
  • Document incident response actions and maintain records for audit and compliance purposes

Requirements for Security Operations Center (SOC) Analyst:

The requirements for the job of Security Operations Center (SOC) Analysts are as following.

  • Total Experience: 8+ years in IT or cybersecurity
  • Relevant Experience: 6+ years in Security Operations Center roles
  • Expertise in Microsoft Sentinel, Microsoft Defender XDR, and KQL
  • Hands-on experience with Azure Log Analytics, SIEM tools, and security incident management
  • Strong understanding of cybersecurity principles, threat intelligence, and attack methodologies
  • Ability to analyze and respond to complex security threats in real-time
  • Excellent problem-solving skills and attention to detail

Skills and Knowledge Desired:

  • Experience with other security tools and platforms
  • Cybersecurity certifications (e.g., Azure Security Engineer, CEH, CISSP, or equivalent)
  • Strong verbal and written communication skills
  • Experience working in global SOC environments

Benefits Package:

  • Work with a globally recognized IT services company
  • Exposure to leading-edge security technologies and large-scale enterprise environments
  • Competitive compensation and performance-based incentives
  • Professional development opportunities and access to training
  • Collaborative, innovation-driven work culture

Location