This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
At Teradata, we believe that people thrive when empowered with better information. That’s why we built the most complete cloud analytics and data platform for AI. By delivering harmonized data, trusted AI, and faster innovation, we uplift and empower our customers—and our customers’ customers—to make better, more confident decisions. The world’s top companies across every major industry trust Teradata to improve business performance, enrich customer experiences, and fully integrate data across the enterprise. You'll be part of a collaborative Security Operations team that serves as the first line of defense for our organization's digital assets. Working closely with SOC Analysts across different shifts, you'll share responsibility for monitoring, triaging, and responding to security events.
Job Responsibility:
Monitor SIEM and security tools for suspicious activity and potential threats
Triage and analyze security alerts to determine impact and urgency
Investigate and respond to cybersecurity incidents, including malware infections, phishing, unauthorized access, and data exfiltration
Escalate significant incidents to senior analysts or incident response teams as needed
Maintain and tune security tools such as SIEM, EDR, IDS/IPS, and firewalls
Assist in rule creation and fine-tuning to reduce false positives and improve detection
Consume and correlate threat intelligence feeds with internal data
Identify indicators of compromise (IOCs) and proactively hunt for threats
Analyze logs from various sources (network, system, application) for anomalies
Correlate events across multiple data sets to uncover patterns and threats
Document incidents, response actions, and findings in incident management systems
Prepare regular reports on security posture, incident metrics, and threat trends
Interpret vulnerability scan results, penetration test results and describe issues and fixes to non-security experts
Assist in educating users on secure practices and common threats
Identify and automate security processes and practices
Partnering with teammates to refine detection rules, implement new security tools, and optimize our SIEM and EDR platforms
Escalating critical threats and supporting investigations of confirmed security incidents
Coordinating response actions, gathering context on alerts, and implementing remediation measures
Providing operational context on exploited vulnerabilities and prioritizing patching efforts based on threat intelligence
Incorporating emerging threat indicators into detection logic and enriching alert investigations
Requirements:
Bachelor’s degree in Cybersecurity, Computer Science, Information Technology, or a related field
2–5 years of experience in a security operations or vulnerability management role
Experience with vulnerability scanners (Qualys, Tenable)
Experience with SIEM platforms (e.g., Splunk, Microsoft Sentinel, QRadar, etc.)