This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
We're looking for a Security Operations Analyst to join the National Incident Response and Threat (NIRT) team, providing monitoring, analysis, and incident detection in a 24x7 environment. This position focuses on identifying suspicious patterns, investigating alerts, and contributing to ongoing threat detection efforts. The role involves working three consecutive 12-hour shifts per week (specific days and shift, day or night, to be determined based on operational needs). You'll typically partner with one other NIRT analyst during your shift.
Job Responsibility:
Monitor and analyze system logs, network data, and alerts to detect potential security incidents
Perform event triage and escalation, ensuring prompt attention to high-risk or anomalous activity
Investigate suspicious behaviors using multiple monitoring platforms and data sources
Assess data sets, structured and unstructured, to detect emerging patterns, trends, or indicators of compromise
Utilize SIEM and analytics tools to correlate data from various systems and enhance situational awareness
Provide timely and detailed documentation of incidents, observations, and resolutions
Participate in root-cause analysis to improve defenses and reduce recurring threats
Collaborate with internal response teams to coordinate containment and remediation actions
Research current security trends, attacker tactics, and emerging threat vectors to stay ahead of the evolving landscape
Respond to diverse threat types, including malware infections, phishing attempts, insider risk, denial-of-service attacks, and data exfiltration efforts
Assist in refining operational playbooks and tuning monitoring tools for higher accuracy and reduced false positives
Requirements:
Bachelor's degree in Computer Science, Cybersecurity, or a related field (preferred), or equivalent hands-on experience (0-2 years post-degree or 6-8 years total without degree)
Must be a U.S. Citizen able to obtain and maintain a Public Trust or higher-level security clearance
Familiarity with TCP/IP, network packet analysis, and common network protocols
Understanding of core IT infrastructure concepts: firewalls, IDS/IPS, endpoint protection, operating systems, databases, and encryption technologies
Proficiency with SIEM tools and log aggregation systems for real-time event monitoring
Analytical ability to identify anomalies across large, diverse datasets
Knowledge of contemporary cyber threats, attacker methodologies, and digital forensics fundamentals
Strong written and verbal communication for documenting findings and collaborating with technical peers
Ability to work independently while maintaining situational awareness within a team setting
Curiosity and drive to continually research and adapt to evolving security challenges