Apply

Security Operations Analyst

Posted 2024-11-07

View full description

📍 Location: United States, Pacific Time Zone, NOT STATED

💸 Salary: 71000 - 85000 USD per year

🔍 Industry: Cybersecurity

🏢 Company: Blumira

🗣️ Languages: English

🪄 Skills: LeadershipSQLCybersecurityCommunication Skills

Requirements:
  • Demonstrated experience in cybersecurity with curiosity for learning new attack vectors and security frameworks.
  • Basic knowledge of industry-adopted frameworks (e.g., MITRE ATT&CK, CIS, NIST, ISO, PCI-DSS).
  • Experience with a SIEM or SOC.
  • Proficiency in SQL.
  • Strong written and verbal communication skills.
  • Experience with ticketing software like Zendesk.
  • Ability to analyze information quickly and respond timely.
  • Ability to keep the big picture in mind regarding customer interactions.
  • Capability to work independently with minimal direction.
  • Quality character and a strong desire to help others.
  • Experience with Regex, GCP, AWS, or Kibana is a plus.
  • Education in IT/Computer Science or Cybersecurity is preferred.
Responsibilities:
  • Deliver the best possible support experiences for customers through security expertise and empathetic communication.
  • Advise customers on security-related questions and product issues.
  • Troubleshoot incidents and analyze logs for context.
  • Be on-call for rare critical security incidents.
  • Share technical expertise with the Security Operations team and customers.
  • Work with Incident Detection Engineering to triage security incidents.
  • Provide leadership and support during security events.
  • Improve team efficiency through process creation and feature ideas.
Apply

Related Jobs

Apply

📍 United States

💸 136000 - 172000 USD per year

🔍 Insurance

🏢 Company: Quanata

  • Bachelor’s degree or equivalent experience.
  • 3-5 years of experience in security operations, incident response, or related roles.
  • Experience with security monitoring tools and SIEM platforms.
  • Strong understanding of security principles and common attack vectors.
  • Proficiency in security tools such as IDS/IPS and firewalls.
  • Familiarity with network protocols and cloud environments (e.g., AWS, GCP).
  • Strong analytical and problem-solving skills.
  • Excellent communication skills for technical and non-technical audiences.
  • Ability to work independently and as part of a team.

  • Monitor security alerts and events using SIEM and other security tools.
  • Analyze and investigate security incidents to determine their impact.
  • Respond to security incidents, including containment and recovery efforts.
  • Conduct forensic analysis and collaborate with other teams to resolve incidents.
  • Assist in vulnerability assessments and track remediation efforts.
  • Contribute to the continuous improvement of security processes.
  • Develop and maintain security operations documentation.

AWSCloud ComputingCybersecurityGCPAmazon Web Services

Posted 2024-10-20
Apply
Apply

📍 California, Arizona, Washington, Utah, Texas, Pennsylvania, Oregon, New York, Minnesota, Massachusetts, Indiana, Colorado

💸 70000 - 75000 USD per year

🔍 Apparel and footwear

🏢 Company: Deckers

  • Solid understanding of security principles.
  • Hands-on experience with automation and threat detection tools.
  • Ability to adapt to a dynamic environment.

  • Monitor, analyze, and respond to security incidents using advanced threat detection tools.
  • Engage in proactive threat hunting to identify hidden threats across the network.
  • Automate security processes to improve efficiency.
  • Collaborate with senior security engineers and IT teams on security strategies.
  • Conduct vulnerability assessments and recommend remediation strategies.
  • Stay updated on security trends and provide actionable insights.

Cybersecurity

Posted 2024-10-20
Apply
Apply

📍 USA

🔍 Financial services

🏢 Company: Stripe👥 1000-10000

  • 5+ years experience in information technology or cyber security roles including security operations/incident response.
  • 2+ years experience analyzing large data sets to solve problems and/or manage projects related to security event triage and/or workplace investigations.
  • B.S. or M.S. in Cyber Security and Information Assurance, Data Analytics, Computer Science or related field, or equivalent experience.
  • Working knowledge of SQL.
  • Basic knowledge of scripting or programming in Python, Go, or other programming languages.
  • Proven experience with log querying and analysis using one or more industry standard SIEM Platforms.
  • Proficiency using analytical methods to inform detection systems or guide strategic response.
  • Strong cross-functional collaboration and written/verbal communication skills.
  • Ability to think creatively and holistically about identifying and reducing risk in a complex environment.
  • High level of judgment, objectivity, and discretion.

  • Analyze and investigate activity on company devices that could represent a security threat.
  • Work cross-functionally with the Security teams to develop solutions for analyzing security events at scale.
  • Interpret disparate data sources to report on trends and support investigative requests.
  • Collect requirements for enhancements to detection models and response systems.
  • Leverage existing systems and data to perform analyses and promote process improvements.
  • Provide actionable insights to help identify, prevent, detect, and respond to anomalous or potentially malicious user activity.
  • Collaborate effectively with teammates, lead projects, mentor others, and develop quality operational standards across the team.

PythonSQLData AnalysisData analysisGoCommunication SkillsCollaboration

Posted 2024-10-18
Apply