About the job Security Operations (SecOps) Analyst
Security Operations (SecOps) Analyst
Position Overview
We are seeking a Security Operations Analyst to monitor, detect, and respond to cybersecurity threats through advanced SIEM platforms, automated response workflows, and comprehensive security operations center (SOC) activities, ensuring 24/7 protection of organizational assets and rapid incident response capabilities.
Key Responsibilities
- Monitor and analyze security events using SIEM platforms including Rapid7 InsightIDR, Splunk, QRadar, and Microsoft Sentinel
- Configure detection rules, correlation policies, and custom dashboards for threat identification
- Tune SIEM alerts to reduce false positives and improve detection accuracy
- Manage log ingestion, parsing, and retention policies across diverse security data sources
- Perform threat hunting activities using SIEM query languages and analytical capabilities
- Security Alert Analysis & Investigation
- Conduct real-time analysis of security alerts and prioritize incidents based on risk and impact
- Investigate suspicious activities, malware infections, and potential data breaches
- Perform initial incident triage and escalate critical threats to senior analysts and incident response teams
- Document investigation findings and maintain detailed case management records
- Correlate security events across multiple platforms to identify attack patterns and campaigns
- SOAR Implementation & Automation
- Develop and maintain Security Orchestration, Automation, and Response (SOAR) playbooks
- Automate routine security tasks including alert enrichment, containment actions, and notification workflows
- Design automated response procedures for common security incidents and attack vectors
- Configure integration between SOAR platforms and security tools for seamless workflow execution
- Measure and optimize automation effectiveness and response time improvements
- Security Operations Center Support
- Provide 24/7 SOC monitoring and first-line incident response capabilities
- Maintain security operations documentation including runbooks, procedures, and escalation matrices
- Support security awareness initiatives and provide feedback on security tool effectiveness
- Collaborate with threat intelligence teams to integrate IOCs and threat feeds into detection systems
- Generate security metrics, KPIs, and executive reporting on security operations performance
Required Qualifications
Technical Skills
- 6+ years experience in security operations center (SOC) or security monitoring roles
- Expert proficiency with SIEM platforms (Rapid7 InsightIDR, Splunk, IBM QRadar, Microsoft Sentinel)
- Strong experience with SOAR platforms (Phantom, Demisto, Swimlane) and automation development
- Knowledge of security technologies including EDR, NDR, IDS/IPS, and threat intelligence platforms
- Understanding of network protocols, log analysis, and security event correlation techniques
- Proficiency in scripting languages (Python, PowerShell) for automation and custom integrations
- Strong understanding of cybersecurity frameworks (NIST, MITRE ATT&CK) and threat landscapes
- Experience with incident response procedures and forensic investigation techniques
- Knowledge of malware analysis, threat hunting, and behavioral analytics
- Understanding of compliance requirements and security audit processes
- Bachelor\'s degree in Cybersecurity, Information Technology, or related field
- Security certifications (Security+, CySA+, GCIH, GCFA, CISSP)
- Experience with cloud security monitoring (AWS CloudTrail, Azure Security Center, GCP Security Command Center)
- Background in network security, endpoint protection, and vulnerability management
- Knowledge of DevSecOps practices and security tool integration