Job Search and Career Advice Platform

Activez les alertes d’offres d’emploi par e-mail !

Security Operations (SecOps) Analyst

Blackfluo.ai

Paris

Sur place

EUR 60 000 - 85 000

Plein temps

Il y a 30+ jours

Générez un CV personnalisé en quelques minutes

Décrochez un entretien et gagnez plus. En savoir plus

Résumé du poste

A cybersecurity firm in Nouvelle-Aquitaine is seeking an experienced Security Operations Analyst. The role involves monitoring and responding to cybersecurity threats, using SIEM and SOAR tools, and requires a strong background in security operations and incident response. Ideal candidates will have at least 6 years of experience and relevant certifications.

Qualifications

  • 6+ years experience in security operations or monitoring roles.
  • Expertise with SIEM and SOAR platforms.
  • Proficiency in scripting languages for automation.

Responsabilités

  • Monitor and analyze security events using various SIEM platforms.
  • Conduct real-time analysis of security alerts.
  • Develop and maintain SOAR playbooks.

Connaissances

Monitoring security events
Incident response
Threat hunting
Automation development
Security alert analysis

Formation

Bachelor's degree in Cybersecurity or related field

Outils

Rapid7 InsightIDR
Splunk
Microsoft Sentinel
IBM QRadar
Description du poste
About the job Security Operations (SecOps) Analyst

Security Operations (SecOps) Analyst

Position Overview

We are seeking a Security Operations Analyst to monitor, detect, and respond to cybersecurity threats through advanced SIEM platforms, automated response workflows, and comprehensive security operations center (SOC) activities, ensuring 24/7 protection of organizational assets and rapid incident response capabilities.

Key Responsibilities
  • SIEM Platform Management
  • Monitor and analyze security events using SIEM platforms including Rapid7 InsightIDR, Splunk, QRadar, and Microsoft Sentinel
  • Configure detection rules, correlation policies, and custom dashboards for threat identification
  • Tune SIEM alerts to reduce false positives and improve detection accuracy
  • Manage log ingestion, parsing, and retention policies across diverse security data sources
  • Perform threat hunting activities using SIEM query languages and analytical capabilities
  • Security Alert Analysis & Investigation
  • Conduct real-time analysis of security alerts and prioritize incidents based on risk and impact
  • Investigate suspicious activities, malware infections, and potential data breaches
  • Perform initial incident triage and escalate critical threats to senior analysts and incident response teams
  • Document investigation findings and maintain detailed case management records
  • Correlate security events across multiple platforms to identify attack patterns and campaigns
  • SOAR Implementation & Automation
  • Develop and maintain Security Orchestration, Automation, and Response (SOAR) playbooks
  • Automate routine security tasks including alert enrichment, containment actions, and notification workflows
  • Design automated response procedures for common security incidents and attack vectors
  • Configure integration between SOAR platforms and security tools for seamless workflow execution
  • Measure and optimize automation effectiveness and response time improvements
  • Security Operations Center Support
  • Provide 24/7 SOC monitoring and first-line incident response capabilities
  • Maintain security operations documentation including runbooks, procedures, and escalation matrices
  • Support security awareness initiatives and provide feedback on security tool effectiveness
  • Collaborate with threat intelligence teams to integrate IOCs and threat feeds into detection systems
  • Generate security metrics, KPIs, and executive reporting on security operations performance
Required Qualifications

Technical Skills

  • 6+ years experience in security operations center (SOC) or security monitoring roles
  • Expert proficiency with SIEM platforms (Rapid7 InsightIDR, Splunk, IBM QRadar, Microsoft Sentinel)
  • Strong experience with SOAR platforms (Phantom, Demisto, Swimlane) and automation development
  • Knowledge of security technologies including EDR, NDR, IDS/IPS, and threat intelligence platforms
  • Understanding of network protocols, log analysis, and security event correlation techniques
  • Proficiency in scripting languages (Python, PowerShell) for automation and custom integrations
  • Security Skills
  • Strong understanding of cybersecurity frameworks (NIST, MITRE ATT&CK) and threat landscapes
  • Experience with incident response procedures and forensic investigation techniques
  • Knowledge of malware analysis, threat hunting, and behavioral analytics
  • Understanding of compliance requirements and security audit processes
  • Preferred Qualifications
  • Bachelor\'s degree in Cybersecurity, Information Technology, or related field
  • Security certifications (Security+, CySA+, GCIH, GCFA, CISSP)
  • Experience with cloud security monitoring (AWS CloudTrail, Azure Security Center, GCP Security Command Center)
  • Background in network security, endpoint protection, and vulnerability management
  • Knowledge of DevSecOps practices and security tool integration
Obtenez votre examen gratuit et confidentiel de votre CV.
ou faites glisser et déposez un fichier PDF, DOC, DOCX, ODT ou PAGES jusqu’à 5 Mo.