CrawlJobs Logo

Security Analyst

Cyera

Location Icon

Location:
United States, St. Louis

Category Icon
Category:
IT - Administration

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

The Security Analyst plays a key role in protecting our organization by detecting, investigating, and responding to security incidents across our environment. This individual will operate on the front lines of our Security Operations Center (SOC), leveraging a variety of tools and intelligence sources to identify threats, contain issues, and continuously improve our defenses. The ideal candidate is detail-oriented, proactive, and eager to deepen their technical expertise in a fast-paced, collaborative security team.

Job Responsibility:

  • Triage incoming security alerts and requests, ensuring timely communication and resolution in coordination with internal stakeholders
  • Conduct first-line investigations using data from SIEM queries, IAM logs, and endpoint/cloud telemetry
  • Execute approved containment and remediation actions (e.g., disabling user accounts, revoking tokens, quarantining assets)
  • Collaborate closely with IT, Security Engineering, and MSSP partners to escalate and resolve complex incidents
  • Document investigation steps, outcomes, and lessons learned for future reference and process improvement
  • Utilize security tools such as SIEM, DLP, EDR, and DSPM platforms to validate alerts, uncover misconfigurations, and identify potential threats
  • Tune detection rules and contribute to continuous improvement of alert quality, reducing false positives
  • Monitor threat intelligence feeds to identify new vulnerabilities and recommend practical mitigation strategies
  • Partner with engineering teams to enhance visibility and strengthen detection coverage across systems and environments
  • Draft, maintain, and refine SOPs and runbooks for recurring alerts and incident types
  • Help define alert severity levels, SLAs, and escalation paths
  • identify opportunities for automation and workflow optimization
  • Build lightweight dashboards and KPIs (e.g., alert volume, false positive rate, SLA attainment) to provide actionable insights to leadership

Requirements:

  • 2–4 years of experience in security operations, incident response, or threat detection
  • Familiarity with SIEM, EDR, and related security tools (e.g., Splunk, Sentinel, CrowdStrike, etc.)
  • Understanding of IAM, cloud platforms (AWS, GCP, Azure), and basic network security principles
  • Strong analytical and problem-solving skills, with attention to detail and documentation
  • Excellent communication and teamwork skills
What we offer:
  • Ability to work remotely, with office setup reimbursement
  • Competitive salary
  • Unlimited PTO
  • Paid holidays and sick time
  • Health, vision, and dental insurance
  • Life, short and long-term disability insurance

Additional Information:

Job Posted:
December 08, 2025

Employment Type:
Fulltime
Work Type:
Remote work
Job Link Share:
Welcome to CrawlJobs.com
Your Global Job Discovery Platform
At CrawlJobs.com, we simplify finding your next career opportunity by bringing job listings directly to you from all corners of the web. Using cutting-edge AI and web-crawling technologies, we gather and curate job offers from various sources across the globe, ensuring you have access to the most up-to-date job listings in one place.