This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
Become a Security Guardian! We are seeking a highly motivated Security Analyst (4+ years experience) to join our Detect & Respond team. Reporting to the Detect & Respond Lead, you will proactively monitor, investigate, and respond to advanced threats while partnering with engineering and infrastructure teams to reduce risk exposure through effective threat detection improvements. This role requires a keen eye for detail, strong analytical rigor, and the ability to work effectively under pressure.
Job Responsibility:
Investigate and analyze security alerts from SIEM, EDR, Dark Web Monitoring & Cloud Security Tools
Provide comprehensive support for incident response activities, including containment, eradication, and recovery
Perform thorough root cause analysis and document incident findings
Develop and refine incident response playbooks
Work effectively and collaboratively with our Managed Security Service Provider (MSSP)
Conduct hypothesis-driven threat hunting across endpoint, network, and cloud environments
Leverage EDR tooling to detect lateral movement and suspicious activity
Stay continuously up-to-date on emerging threat intelligence and attacker behaviors
Managing the incident from the moment it is escalated by Tier 1 until final closure, ensuring adherence to established frameworks like the NIST or SANS incident response lifecycles
Acting as the primary technical point of contact during an active incident. This involves directing IT operations, network engineers, or system administrators on exactly what systems need to be isolated, patched, or restored
Participating in or leading post-mortem meetings after a severe incident is resolved. The Level 2 analyst is expected to identify gaps in current defenses, suggest SIEM/EDR rule tuning, and recommend process improvements to prevent a recurrence
Support ISO 27001, PCI DSS, and audit-related evidence gathering requirements
Maintain detailed documentation of investigations, procedures, and remediation
Contribute to improving SOC processes and runbooks
Requirements:
4+ years of hands-on experience in a Security Analyst, SOC, or Incident Response role
Strong experience with SIEM platforms (e.g., Splunk, Sentinel, Crowdstrike, Rapid7)
Hands-on experience with EDR tools (e.g., CrowdStrike, Defender, SentinelOne)
Strong understanding of networking fundamentals, security principles, and common attack vectors
Excellent analytical, communication, and collaboration skills, with the ability to translate technical findings into business-impact language
Nice to have:
Experience working in hybrid/cloud environments (AWS, Azure, or GCP)
Experience in fintech, SaaS, or product-based organizations
Exposure to cloud-native security tools (Wiz, Orca, Prisma, etc.)
Relevant industry certifications are welcome, but not required (such as Security+, CySA+, GCIH, CCSP, or AWS Security Specialty)