This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
The Security Analyst plays a key role in protecting our organization by detecting, investigating, and responding to security incidents across our environment. This individual will operate on the front lines of our Security Operations Center (SOC), leveraging a variety of tools and intelligence sources to identify threats, contain issues, and continuously improve our defenses. The ideal candidate is detail-oriented, proactive, and eager to deepen their technical expertise in a fast-paced, collaborative security team.
Job Responsibility:
Triage incoming security alerts and requests, ensuring timely communication and resolution in coordination with internal stakeholders
Conduct first-line investigations using data from SIEM queries, IAM logs, and endpoint/cloud telemetry
Execute approved containment and remediation actions (e.g., disabling user accounts, revoking tokens, quarantining assets)
Collaborate closely with IT, Security Engineering, and MSSP partners to escalate and resolve complex incidents
Document investigation steps, outcomes, and lessons learned for future reference and process improvement
Utilize security tools such as SIEM, DLP, EDR, and DSPM platforms to validate alerts, uncover misconfigurations, and identify potential threats
Tune detection rules and contribute to continuous improvement of alert quality, reducing false positives
Monitor threat intelligence feeds to identify new vulnerabilities and recommend practical mitigation strategies
Partner with engineering teams to enhance visibility and strengthen detection coverage across systems and environments
Draft, maintain, and refine SOPs and runbooks for recurring alerts and incident types
Help define alert severity levels, SLAs, and escalation paths
identify opportunities for automation and workflow optimization
Build lightweight dashboards and KPIs (e.g., alert volume, false positive rate, SLA attainment) to provide actionable insights to leadership
Requirements:
2–4 years of experience in security operations, incident response, or threat detection
Familiarity with SIEM, EDR, and related security tools (e.g., Splunk, Sentinel, CrowdStrike, etc.)
Understanding of IAM, cloud platforms (AWS, GCP, Azure), and basic network security principles
Strong analytical and problem-solving skills, with attention to detail and documentation
Excellent communication and teamwork skills
What we offer:
Ability to work remotely, with office setup reimbursement
Welcome to CrawlJobs.com – Your Global Job Discovery Platform
At CrawlJobs.com, we simplify finding your next career opportunity by bringing job listings directly to you from all corners of the web. Using cutting-edge AI and web-crawling technologies, we gather and curate job offers from various sources across the globe, ensuring you have access to the most up-to-date job listings in one place.
We use cookies to enhance your experience, analyze traffic, and serve personalized content. By clicking “Accept”, you agree to the use of cookies.