Cybersecurity SOC Analyst

Russell Investments

Russell Investments

IT

Mumbai, Maharashtra, India

Posted on May 11, 2026

Reporting To:

Associate Manager, SOC

Shift:

US (8:30 pm - 5:30 am IST) (India)

About Russell Investments, Mumbai:

Russell Investments is a leading outsourced financial partner and global investment solutions firm providing a wide range of investment capabilities to institutional investors, financial intermediaries, and individual investors around the world. Building on an 90-year legacy of continuous innovation to deliver exceptional value to clients, Russell Investments works every day to improve the financial security of its clients. The firm is “Top 12 Ranked Consultant (2009-2024)” in P&I survey 2024 with $962 billion in assets under advisement (as of December 31, 2025) and $376.9 billion in assets under management (as of December 31, 2025) for clients in 30 countries. Headquartered in Seattle, Washington in the United States, Russell Investments has offices around the world, including London, New York, Toronto, Sydney, Tokyo, Shanghai – and has opened a new office in Mumbai, India in June 2023.

Joining the Mumbai office is an incredible opportunity to work closely with global stakeholders to support the technology and infrastructure that drives the investment and trading processes of a globally recognized asset management firm. Be part of the team based out of Goregaon (East) and contribute to the foundation and culture of the firm’s growing operations in India. The Mumbai office operates with varying shifts to accommodate time zones around the world.

For more information, please visit https://www.russellinvestments.com.


Job Description:

We are seeking an experienced Cybersecurity Analyst to join our Security Operations Center (SOC) team. The SOC provides 24x7 security operations monitoring for the Russell Investments environment. You’ll use various tools and dashboards to monitor the environment, triage events to detect legitimate security concerns, and respond according to established processes. You’ll interact regularly with other members of the Cybersecurity team as well as other IT support teams.

Years of Experience

  • Minimum 3 years’ experience in Cybersecurity or related field

Key Responsibilities

  • Continuously monitor and analyze security events and incidents using advanced security tools to identify potential threats, vulnerabilities, and suspicious activities across the environment.

  • Identify, classify, and assess potential, successful, and unsuccessful intrusion attempts, ensuring timely escalation and response.

  • Conduct in-depth investigations of security incidents by correlating alerts, logs, and telemetry data, and leveraging internal and external threat intelligence sources to determine scope, root cause, and impact.

  • Perform Incident Response (IR) activities, including containment, eradication, recovery, and post-incident analysis, in line with defined playbooks and SLAs.

  • Participate in proactive threat hunting activities to identify hidden or emerging threats that may evade traditional detection mechanisms.

  • Research new and evolving threats, attack techniques, and adversary tactics that could impact the organization, and recommend improvements to detection and response capabilities.

  • Stay current with the latest cybersecurity news, vulnerabilities, threat trends, and industry best practices, and provide actionable insights to continuously improve security posture.

  • Collaborate with IT, infrastructure, cloud, and application teams to gain deeper understanding of the environment and improve security visibility and response efficiency.

  • Maintain accurate documentation of incidents, investigations, lessons learned, and recommendations, and contribute to the enhancement of SOC processes, runbooks, and detection use cases.

Role Requirements

  • Strong understanding of cybersecurity principles, concepts, and best practices across networks, endpoints, and systems.

  • Solid knowledge of networking fundamentals, firewalls, and operating systems (Windows and Linux).

  • Proven experience in security incident detection, analysis, and response within a SOC or similar environment.

  • Hands-on familiarity with security technologies such as SIEM, IDS/IPS, firewalls, endpoint detection and response (EDR), and vulnerability scanning tools.

  • Experience correlating and interpreting data from multiple sources to analyze complex security issues and propose effective remediation strategies.

  • Working knowledge of industry standards and frameworks, including the NIST Cybersecurity Framework and ISO/IEC 27001.

  • Strong analytical and problem-solving skills, with the ability to prioritize incidents and operate effectively under pressure.

  • Good communication and documentation skills, with the ability to clearly articulate technical findings to both technical and non-technical stakeholders.

Core Values

  • Strong interpersonal, oral, and written communication and collaboration skills

  • Strong organizational skills including the ability to adapt to shifting priorities and meet frequent deadlines,

  • Proactive approach to problem-solving with strong judgment and decision-making capability.

  • Highly resourceful and collaborative team-player, with the ability to also be independently effective and exude initiative and a sense of urgency.

  • Exemplifies our customer-focused, action-oriented, results-driven culture.

  • Forward looking thinker, who actively seeks opportunities, has a desire for continuous learning, and proposes solutions.

  • Ability to act with discretion and maintain complete confidentiality.

  • Dedicated to the firm’s values of non-negotiable integrity, valuing our people, exceeding client expectations, and embracing intellectual curiosity and rigor.