CrawlJobs Logo

Security Engineer - SOC Analyst

creandum.com Logo

Creandum

Location Icon

Location:
Sweden , Malmö

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

Working with the Security Operations Lead, in this role you will operate our security operations capability so that it provides an appropriate monitoring, detection, investigation and response capability. Using a range of tools, working with your security engineering colleagues, you will be part of a team building a SOC service that supports our client and internal services.

Job Responsibility:

  • Incident triage, analysis, response and investigations based on alerts
  • Monitoring and responding to endpoint detection and response
  • Investigating detected, suspicious behaviours and escalating as appropriate
  • Proactively investigating alerts and suspicious activities, following through to gain a full understanding of the behaviour
  • Adding context to a confirmed incident to aid understanding and response
  • Supporting the development of incident handling procedures
  • Supporting incident/crisis management
  • Identifying, documenting and developing detections
  • Building and developing incident playbooks
  • Creating reports and visualisations of attacks
  • Tracking trends for metrics and reporting
  • Briefing the CISO on alert findings and their impact on the business
  • Continuously working to decrease false positives
  • Maintaining the detection rules database

Requirements:

  • Minimum of 5 years experience or knowledge in security operations or related roles
  • Enjoy the challenge of delivering security into business operations
  • Work independently to perform analyses and investigations
  • Experience or knowledge of working in modern cloud environments, such as AWS, GCP or Azure
  • Experience using Security Information Event Management (SIEM) and related technologies
  • Experience using Endpoint Detection & Response (EDR) and related technologies
  • Strong analytical and investigation skills
  • Proficient in several programming languages, including Python, and/or PHP
  • Excellent written and verbal communication skills as well as receptive listening skills, with ability to present complex ideas in a clear, concise fashion to technical and non-technical audiences
  • Proactively contribute ideas to the development of security at Neo4j
  • Awareness of hacking techniques and trends and investigation or awareness of Cyber Threat Intelligence in a business context

Nice to have:

  • A software development background is desirable
  • Appropriate certifications or relevant experience in SOC operations

Additional Information:

Job Posted:
March 09, 2026

Work Type:
Hybrid work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Security Engineer - SOC Analyst

Senior Information Security Compliance Analyst

We're looking for a technically grounded Senior IS Compliance Analyst who speaks...
Location
Location
United States , Chicago
Salary
Salary:
90000.00 - 130000.00 USD / Year
blumeglobal.com Logo
Blume Global
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Hands-on experience in technical security roles such as Security Operations, Incident Response, Security Analysis, penetration testing, or similar
  • Practical knowledge of security tools, SIEM platforms, vulnerability management, and security monitoring
  • and ability to read and understand security logs, configurations, and technical documentation
  • 6+ years of total experience with significant time in GRC
  • Working knowledge of ISO 27001, NIST frameworks, SOC 1/2, and GDPR requirements
  • Experience developing and implementing information security policies and controls
  • ISO 27001:2022 Lead Implementer and Lead Auditor certification
Job Responsibility
Job Responsibility
  • Lead technical security assessments and integration of acquired companies, mapping their security architectures and controls to our GRC frameworks, identifying gaps, and building remediation roadmaps that address both technical security and compliance alignment
  • Bridge technical security and business stakeholders by evaluating risks through a technical lens, working alongside security engineering teams to translate GRC requirements into practical security measures, and communicating effectively across technical and non-technical audiences
  • Develop and harmonize security policies and control frameworks across acquired entities, ensuring they're both audit ready and operationally sound, while translating between technical security requirements and governance documentation
  • Own customer security questionnaire responses by leveraging your hands-on security background to provide detailed, accurate answers and collaborating with infrastructure, application security, and operations teams to gather technical evidence
  • Drive continuous improvement of our GRC program through technical security enhancements, meaningful security and compliance metrics, and process improvements that increase both control effectiveness and operational efficiency
What we offer
What we offer
  • health and welfare benefits
  • tuition assistance
  • 401K savings and other retirement programs
  • employee assistance programs
Read More
Arrow Right

Security Operations Analyst I

Our Security Operations Analyst I position supports our Virtual Network and Secu...
Location
Location
United States , North Wilkesboro
Salary
Salary:
Not provided
infusionpoints.com Logo
InfusionPoints
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • AS/BS degree in Information Technology, Computer Science, Engineering or related field
  • 1-3 years of hands-on deep technical experience
  • Security analysis, threat hunting, forensics, flow analysis, and log management experience
  • IDS/IPS management, PCAP carving, file extraction, and long tail analysis experience
  • Strong understanding of attacker tactics, techniques, and procedures
  • Understanding of endpoint and network security
  • Experience with or knowledge of vulnerability management and penetration testing of systems, applications, and networks
  • General understanding of industry standards, compliance, and legal guidelines: ISO 27001, FedRAMP, NIST 800-171, NIST 800-53, SOC 2, and HIPAA
  • Self-starter able to drive towards goals and manage time effectively
  • Analytical and the ability to think on the fly
Job Responsibility
Job Responsibility
  • Perform event and incident triage, threat hunting, and incident response
  • Use industry-leading commercial and open source software to detect, evaluate, triage, prioritize, and respond to security events
  • Support research and development, security module creation, automation, and process improvement
  • Support vulnerability management and penetration tests
  • Write both technical and executive incident reports when called upon
  • Continuous learning and improvement of security analysis skills to match current technical security challenges and innovations
What we offer
What we offer
  • competitive compensation and benefits package
  • Fulltime
Read More
Arrow Right

Security Operations Manager

As the Security Operations Manager, you will lead Cyera’s security operations fu...
Location
Location
United States , St. Louis
Salary
Salary:
Not provided
cyera.io Logo
Cyera
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 6–8 years of progressive experience in security operations, incident response, or threat management roles
  • 2+ years of experience managing or leading a SOC or security operations function
  • Deep technical understanding of modern security tools and technologies (SIEM, EDR, SOAR, IDS/IPS, CSPM, vulnerability scanners)
  • Strong knowledge of cloud security (AWS, Azure, GCP) and modern DevSecOps practices
  • Proven ability to lead cross-functional incident response efforts and drive resolution under pressure
  • Excellent communication, leadership, and stakeholder management skills
  • Solid understanding of compliance frameworks (SOC 2, ISO 27001, NIST, etc.)
Job Responsibility
Job Responsibility
  • Own the Security Operations function, including 24/7 monitoring, detection, triage, and incident response
  • Develop and maintain Cyera’s Security Operations Center (SOC) processes, playbooks, and escalation paths
  • Lead investigations of security alerts and incidents, ensuring timely response, containment, and remediation
  • Manage and continuously improve security tooling (SIEM, EDR, SOAR, vulnerability management, etc.)
  • Build and mentor a high-performing team of security analysts and engineers
  • Partner with Engineering, IT, and Product to embed security into all stages of the development lifecycle
  • Conduct regular threat modeling, risk assessments, and post-incident reviews to identify and mitigate systemic weaknesses
  • Oversee vulnerability management and coordinate patching or mitigations across infrastructure and SaaS environments
  • Collaborate with Compliance to support audit readiness (SOC 2, ISO 27001, GDPR, etc.) and maintain evidence of operational controls
  • Develop and report security KPIs and metrics to leadership and key stakeholders
What we offer
What we offer
  • Ability to work remotely, with office setup reimbursement
  • Competitive salary
  • Unlimited PTO
  • Paid holidays and sick time
  • Health, vision, and dental insurance
  • Life, short and long-term disability insurance
  • Fulltime
Read More
Arrow Right

Service Delivery Manager - Managed Security

HPE Operations is our innovative IT services organization. It provides the exper...
Location
Location
India , Bangalore
Salary
Salary:
Not provided
https://www.hpe.com/ Logo
Hewlett Packard Enterprise
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 5+ years of experience in managed security services, cybersecurity delivery management, or IT service management
  • Proven track record of managing complex client relationships and delivering managed services
  • Experience working with Security Operations Centers (SOC) or MSSPs is highly desirable
  • Should have managed a team of Cyber Security engineers including SIEM, Vulnerability, IAM, HSM, etc
  • Experience in at least 3 of the below products is desirable: Microsoft Sentinel with Copilot, Microsoft Defender including VA, Thales HSM & Cipher Trust Manager, CyberArk PAM, Nexus Smart ID
Job Responsibility
Job Responsibility
  • Oversee the end-to-end delivery of managed security services, such as threat monitoring, incident response, vulnerability management, endpoint protection, and other cybersecurity services
  • Ensure services are delivered in compliance with Service Level Agreements (SLAs) and established security frameworks (e.g., NIST, ISO 27001)
  • Monitor and measure the performance of managed security services, identifying areas for improvement and ensuring high-quality service delivery
  • Manage and coordinate teams responsible for delivering managed security services, including security analysts, engineers, and consultants
  • Collaborate with internal teams (e.g., SOC, engineering, compliance) to ensure seamless service delivery and resolution of client issues
  • Provide leadership, guidance, and support to team members, fostering a culture of accountability and continuous improvement
What we offer
What we offer
  • Health & Wellbeing
  • Personal & Professional Development
  • Unconditional Inclusion
  • Fulltime
Read More
Arrow Right

Principal Cybersecurity Incident Response Analyst

Principal Cybersecurity Incident Response Analyst role at HPE's Cyber Defense Ce...
Location
Location
India , Bangalore
Salary
Salary:
Not provided
https://www.hpe.com/ Logo
Hewlett Packard Enterprise
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor's degree (or equivalent work experience) required, preferably in computer science, engineering or related area of study
  • Typically 8+ years of relevant experience
  • SOC team/Incident response/Advanced threat analyst experience is required
  • Proven track record of leading complex cybersecurity initiatives and managing ambiguous incidents
  • Extensive understanding of adversary tactics, techniques, and procedures (TTPs)
  • Extensive Cyber and IT security knowledge
  • Extensive understanding of Cyber and IT security risks, best practices, threats and prevention measures
  • Extensive understanding of SQL and relevant scripting languages
  • Extensive data security system analysis skills
  • Extensive risk assessment and management skills
Job Responsibility
Job Responsibility
  • Lead and coordinate responses to the most severe and complex cybersecurity incidents
  • Guide cross-functional teams through containment, eradication, and recovery
  • Provide executive-level oversight and decision-making during critical incidents
  • Effectively analyze associated logs and respond to high severity incidents
  • Contribute to the company's security response methods
  • Mentor and provide technical guidance to less experienced cybersecurity professionals
  • Stay at the forefront of cybersecurity trends, threats, and technologies
  • Foster a culture of continuous improvement and innovation
  • Provide insight and guidance through after action reviews
What we offer
What we offer
  • Health & Wellbeing benefits
  • Personal & Professional Development programs
  • Unconditional Inclusion environment
  • Comprehensive benefits suite supporting physical, financial and emotional wellbeing
  • Fulltime
Read More
Arrow Right

Senior Security Engineer

Truveta is the world’s first health provider led data platform with a vision of ...
Location
Location
United States , Seattle
Salary
Salary:
135000.00 - 180000.00 USD / Year
truveta.com Logo
Truveta
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in Cyber Security, Computer Science, Information Security, Information Systems, or a related field, or equivalent practical experience
  • 5+ years of experience in Security Operations (SOC), Incident Response, or Detection & Response role, with demonstrated ownership of complex security incidents
  • Hands-on experience with Microsoft Sentinel (SIEM) and Microsoft Defender XDR (Defender for Endpoint, Identity, Office 365, Cloud Apps)
  • Proficiency in KQL (Kusto Query Language) for investigations, threat hunting, and detection engineering
  • Experience designing, tuning, and maintaining SIEM detections and SOAR automation, including alert triage and response workflows
  • Solid understanding of Azure cloud architecture, core services, and native security controls
  • Familiarity with Azure Entra ID, identity security concepts, RBAC, and IAM-related threats
  • Experience with handing high-severity security incidents, including cross-team coordination and stakeholder communication
  • Familiarity with MITRE ATT&CK, threat actor techniques, and modern attack methodologies across cloud, identity, and endpoint environments
  • Experience supporting on-call rotations and working in a 24/7 or follow-the-sun SOC environment
Job Responsibility
Job Responsibility
  • Incident Response: Handle investigation and response to security incidents across endpoints, identities, email, cloud workloads, and SaaS applications
  • Act as a senior escalation point for SOC analysts during complex or ambiguous security events
  • Participate in on-call rotations and provide senior-level escalation support when needed
  • Lead or contribute to post-incident reviews (RCA, postmortems) and track remediation actions to completion
  • Ensure incidents are accurately documented for audit, compliance, and operational learning
  • Maintain and improve incident response runbooks, playbooks, and escalation procedures
  • Support incident readiness activities, including tabletop exercises and response drills
  • Detection Engineering & Automation: Develop, tune, and maintain Microsoft Sentinel analytics rules to improve detection quality and reduce false positives
  • Design and optimize KQL queries for investigations, threat hunting, and detection engineering
  • Integrate and maintain log sources and data connectors in Microsoft Sentinel, ensuring data quality and proper normalization
What we offer
What we offer
  • Interesting and meaningful work for every career stage
  • Great benefits package
  • Comprehensive benefits with strong medical, dental and vision insurance plans
  • 401K plan
  • Professional development & training opportunities for continuous learning
  • Work/life autonomy via flexible work hours and flexible paid time off
  • Generous parental leave
  • Regular team activities (virtual and in-person)
  • Fulltime
Read More
Arrow Right

Senior Detection Engineer

This is a detection engineering role that leverages knowledge of monitoring, ana...
Location
Location
Singapore , Singapore
Salary
Salary:
Not provided
https://www.marriott.com Logo
Marriott Bonvoy
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in Computer Sciences or related field or equivalent experience/certification
  • 3+ years of collective experience in Splunk SIEM (Splunk Enterprise Security) threat detection use case development or UEBA (Exabeam) use case development for insider threat use case development
  • 5+ years of experience in security functions such as SOC, CIRT, security engineering, risk management, vulnerability management or technical infrastructure operations, administration, or systems engineering
  • scripting or programming language, including Python
  • Current information security certification such as Certified Information Security Manager (CISM), Certified Information Systems Security Professional (CISSP) preferred
  • offensive and defensive security certifications such as CEH, IGAC Cyber Defense, OSCP or other related certifications preferred
  • Splunk Certification, including Splunk Enterprise Security Certified Admin preferred
  • use case development experience on the Exabeam platform preferred
  • working knowledge of the NIST Cyber Security Framework and ISO/IEC 27001:2022 preferred
  • working knowledge of the MITRE ATT&CK Framework preferred
Job Responsibility
Job Responsibility
  • Lead collaboration sessions within the cyber security tower and other business units to devise security monitoring use cases
  • engage and collaborate with other security engineers and architects as needed to keep pace with the evolution of corporate infrastructure and applications and share that knowledge with peers as appropriate
  • document prospective security monitoring use cases with MITRE ATT&ACK mappings using standard templates and methodologies
  • inform and consult other cyber ops teams of required data onboarding and integrations for use case development
  • develop analytics, correlation searches, dashboards, reports and alerts within the SIEM and UEBA platforms
  • solicit feedback for pre-production security monitoring content through peer review process and user acceptance testing for tuning
  • document developed security monitoring content in a documentation registry using department standard templates and methodologies
  • manage field mapping and transmission of security monitoring alerts to the security incident response platform for SOC analyst consumption as outlined in process documentation
  • provide governance support for the content development function entailing content development standards compliance, change management approvals for SIEM or UEBA content, and lifecycle management of developed security monitoring content
  • service operational requests in queue such as analytics content performance tuning, filtering, search refinement, parsing issues
  • Fulltime
Read More
Arrow Right

Manager, Security Operations & Engineering

We’re seeking a strategic and hands-on Manager of Security Operations & Engineer...
Location
Location
United States , Birmingham
Salary
Salary:
156000.00 - 223000.00 USD / Year
daxko.com Logo
Daxko
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 8+ years in security operations and/or engineering
  • At least 3 years in a leadership or management role
  • Proven success building or maturing SOC and incident response programs in hybrid cloud and on-premise environments
  • Deep expertise in IAM, cloud security (AWS/Azure), vulnerability management, and endpoint protection
  • Hands-on experience with SIEM/SOAR, threat intelligence platforms, IOCs/TTPs, and automation
  • Strong project management, communication, and stakeholder engagement skills
  • A passion for mentoring and growing high-performing technical teams
Job Responsibility
Job Responsibility
  • Lead and inspire a team of security engineers and SOC analysts focused on cloud security, IAM, vulnerability management, and tooling
  • Hire, coach, and retain top talent by fostering a collaborative and growth-oriented culture
  • Conduct regular performance evaluations and handle team matters with fairness and professionalism
  • Drive the daily execution of security operations and oversee a dynamic SOC environment
  • Develop and mature incident response processes—create playbooks, run tabletop exercises, and lead live response to events
  • Define and report on meaningful metrics and KPIs to assess security posture and continuously improve performance
  • Prioritize and lead cross-functional security projects aligned with business risk and strategic priorities
  • Own and optimize the usage of key security platforms including SIEM, SOAR, EDR, and threat intelligence tools
  • Partner with IT, Engineering, DevOps, and GRC to enhance detection capabilities, streamline response, and reduce organizational risk
  • Promote automation and modernize workflows to increase efficiency and reduce alert fatigue
What we offer
What we offer
  • Flexible paid time off
  • Affordable health, dental, and vision insurance options
  • Monthly fitness reimbursement
  • 401(k) matching
  • New-Parent Paid Leave
  • Casual work environments
  • Remote work
  • Fulltime
Read More
Arrow Right