Job Search and Career Advice Platform

Activez les alertes d’offres d’emploi par e-mail !

Security Analyst - SOC experience

Shift Technology

France

Hybride

EUR 45 000 - 65 000

Plein temps

Il y a 28 jours

Générez un CV personnalisé en quelques minutes

Décrochez un entretien et gagnez plus. En savoir plus

Résumé du poste

A leading technology firm in France is looking for a Security Analyst to enhance their digital defenses. This hybrid role involves monitoring threats, developing response strategies, and collaborating with teams on security assurance. Ideal candidates will have 4+ years in security operations and experience with SIEM tools. Competitive salary and benefits included.

Prestations

Flexible remote and hybrid working options
Competitive salary
Company equity
Learning and Development opportunities
Generous PTO and paid holidays
Mental health benefits
2 Make A Difference Days per year

Qualifications

  • 4+ years of experience in Security Operations, Incident Response, or a similar hands-on security role.
  • Hands-on experience with detection engineering and log analysis.

Responsabilités

  • Monitor security alerts to identify and investigate potential threats.
  • Develop incident response playbooks for effective security event management.
  • Perform regular security assurance tasks to identify anomalies.

Connaissances

Analytical mindset
Attention to detail
Excellent communication
Collaboration skills

Formation

Bachelor's Degree in a relevant field

Outils

Azure Sentinel
Splunk
Palo Alto Cortex XDR
CrowdStrike
Microsoft Defender for Endpoint
Tenable
Qualys
Description du poste
DESCRIPTION

As a Security Analyst you will be a hands‑on defender of Shift's digital environment. This is a hybrid role that combines real‑time security operations (SecOps) with proactive infrastructure and application security. You will not only monitor for and respond to threats, but also help develop and automate the detections, playbooks, and responses that mature our security posture, and validate the effectiveness of our security controls.

RESPONSIBILITIES
Threat Detection, Monitoring, and Response Engineering
  • Monitor security alerts from a variety of sources (SIEM, EDR, Cloud Security tools) to identify, triage, and investigate potential threats.
  • Contribute to the development, tuning, and maintenance of detection rules and analytics in the SIEM to improve threat visibility and reduce false positives.
  • Analyze security logs and data to identify anomalous or malicious activity.
  • Utilize automated response actions within our security tooling (SOAR) to handle common threats efficiently and assist in identifying new opportunities for automation.
Incident Response
  • Develop and maintain incident response playbooks and procedures to ensure a consistent and effective response to security events.
  • First responder for security incidents, executing initial analysis and containment procedures based on established playbooks.
  • Support incident response activities, including investigation, evidence gathering, and communication with stakeholders.
Security Assurance & Control Testing
  • Perform regular security assurance tasks, such as user access and configuration reviews.
  • Assist with the third‑party risk management process by supporting technical security assessments of vendors and services.
Collaboration & Improvement
  • Produce reports on security incidents and control test results, and collaborate with engineering teams on remediation efforts.
  • Proactively identify potential security problems and work with partner teams to implement solutions.
  • Support the CISO and the department in regular security operations and control monitoring activities.
SKILLS & BACKGROUND
Experience & Education
  • 4+ years of experience in Security Operations (SOC), Incident Response, or a similar hands‑on security role.
  • Bachelor's Degree in a relevant field or equivalent work experience.
Hands‑On Technical Skills
  • Hands‑on experience with a SIEM platform (e.g., Azure Sentinel, Splunk) for detection engineering, log analysis, threat hunting, and triage. Familiarity with detection logic.
  • Experience with Endpoint Detection & Response (EDR) tools (e.g., Palo Alto Cortex XDR, CrowdStrike, Microsoft Defender for Endpoint).
  • Familiarity with network security technologies (Firewalls, IDS/IPS, WAFs) and vulnerability assessment tools (e.g., Tenable, Qualys).
  • Proficient search logic and query skills (e.g., KQL, Splunk SPL), and familiarity with scripting languages (e.g., PowerShell, Python) for automation and analysis.
  • Experience using SOAR platforms to investigate and respond to incidents.
Knowledge & Frameworks
  • Familiarity with security frameworks, particularly MITRE ATT&CK.
  • Understanding of compliance and privacy frameworks for context (e.g., ISO 27001, SOC 2, NIST CSF, HIPAA, GDPR).
  • Broad understanding of core information security technologies and concepts.
Core Competencies
  • A strong analytical and investigative mindset with high attention to detail.
  • Excellent communication skills, with the ability to clearly articulate technical findings.
  • A collaborative team player who can work effectively with technical and non‑technical stakeholders.
  • The ability to remain calm and methodical under pressure, especially during incident response.
Recruitment Process
  • TA Interview
  • Security team interview
  • Technical interview
  • CISO interview
  • CTO interview
Benefits
  • Flexible remote and hybrid working options
  • Competitive Salary and a variable component tied to personal and company performance
  • Company equity
  • Multiple Learning and Development opportunities, including Focus Fridays, a half‑day each month to focus on learning and personal growth
  • Generous PTO and paid holidays
  • Mental health benefits
  • 2 MAD Days per year (Make A Difference Days for paid volunteering)

At Shift we strive to be a diverse and inclusive workforce. We welcome applications from and hire people who will contribute to the diversity of our company, without regard to race, color, religion, marital status, age, national or ethnic origin, physical or mental disability, medical condition, pregnancy, genetic information, gender identity or expression, sexual orientation, or other non‑merit criteria.

Shift Technology is committed to providing reasonable accommodations for qualified individuals with disabilities in our application and employment process. Should you require accommodation, please email accommodation@shift-technology.com and we will work with you to meet your accessibility needs.

Please be aware of scammers and only trust correspondence that comes from emails ending in "shift-technology.com". We will never do initial outreach to you via Whatsapp/Text/SMS, never ask for banking information or personal identification numbers (ex. Social Security Number) as part of our recruitment process.

Shift Technology does not accept unsolicited CVs from recruiters or employment agencies in response to the Shift Technology Careers page or a Shift Technology social media post. Any unsolicited CVs, including those submitted directly to hiring managers, are deemed to be the property of Shift Technology.

Obtenez votre examen gratuit et confidentiel de votre CV.
ou faites glisser et déposez un fichier PDF, DOC, DOCX, ODT ou PAGES jusqu’à 5 Mo.