Why This Job is Featured on The SaaS Jobs
Security operations roles carry particular weight in SaaS because the product is the service, and availability and data protection are inseparable from customer trust. A SOC Analyst at a cloud software company like Wrike sits at the point where real-time telemetry, user activity, and infrastructure signals converge, making the work directly tied to how SaaS platforms manage operational risk around the clock.
From a career perspective, this position builds durable SaaS security fundamentals: alert triage discipline, incident documentation, and the habit of translating technical findings into risk and impact. Collaboration with infrastructure, application security, and compliance functions also mirrors how mature SaaS organizations structure security, giving exposure to cross-functional incident handling and continuous improvement of detection capabilities that transfer well across SaaS environments.
This role tends to suit security professionals who prefer methodical investigation work, clear escalation paths, and evidence-based decision-making. It aligns with candidates who enjoy tooling-heavy analysis (SIEM/XDR, log correlation) and staying current on vulnerabilities, and who want a position where communication quality matters as much as technical depth.
The section above is editorial commentary from The SaaS Jobs, provided to help SaaS professionals understand the role in a broader industry context.
Job Description
Ready to become a Wriker?
Wrike is looking for a security operations center (SOC) analyst. This team protects Wrike’s valuable assets and data against cyber threats and attacks 24/7.
More about your team:
As a SOC Analyst, you will collaborate with a multidisciplinary security team comprising Infrastructure Security Engineers, Security Engineers, Application Security Engineers, and Compliance specialists. You’ll find yourself among a group of passionate and approachable professionals, dedicated to continuous improvement and teamwork in keeping our organization secure.
Key Responsibilities:
- Monitor, analyze and triage security alerts and events
- Assess risk, impact of potential incidents, and take appropriate remediation steps and actions
- Employ various security tools and technologies to detect and investigate cyber threats
- Work collaboratively with other teams, including incident responders, to ensure proper escalation and resolution of cases
- Document and report security incidents
- Participate in further development and improvement of security monitoring and detection capabilities
- Stay up to date with the latest security trends, vulnerabilities, and best practices.
You will achieve your best if you have:
- Over 5 years of experience in a Security Operation Centre (SOC) or similar role
- Knowledge of network fundamentals and common security threats
- Well-developed logical thinking capabilities and problem-solving skills
- Strong communication skills, both written and verbal
You will stand out with:
- Experience with security information event management (SIEM) and extended detection and response (e.g. Rapid7, Splunk, Wazuh, Microsoft Defender for Endpoint, Crowdstrike)
- Industry certificates is an advantage
- Experience with log analysis and correlation
Perks of working with Wrike
- 10 days of National and Festival Holidays per year (eight fixed, two flexible)
- 18 days of paid vacation per year
- 14 days of sick leave with a medical certificate per year
- 5 uncertified sick days per year
- Group Medical Plan: Coverage for employees, spouse, children, and parents/in-laws for Rs 5,00,000. Free health checkup for employees
- Personal Accident Insurance: Rs 50,00,000
- Term Life Insurance: Rs 50,00,000
- Up to 26 weeks of paid maternity leave for the first two children
- 4 weeks of paid parental leave
- 2 days off for volunteering with nonprofit charities
- Broadband/Internet Reimbursement: INR 1500 per month
- Full-stocked pantry and complimentary lunch
- Hybrid work model
Your recruitment buddy will be Saran Krishnamoorthy, Senior Recruiter.
#LI-SK1