CrawlJobs Logo

Security Operations Analyst

https://www.upguard.com Logo

UpGuard

Location Icon

Location:
Australia , Sydney

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

UpGuard’s mission is to make life easier for security teams. We meticulously create robust solutions that enable our customers to identify, assess, and remediate cybersecurity risk across their attack surface, vendor ecosystem, workforce, and trust relationships. Our integrated cyber risk posture management platform combines comprehensive security ratings, instant risk assessments, templated security questionnaires, threat intelligence capabilities, and agentic AI to give organizations a holistic view of their risk surface. Our Operations function consists of the IT, Legal, People, Finance and Analytics teams. We are here to be a key enabler to our other teams at UpGuard. Efficiency, scale and rich insights are some of the key contributions that this team brings to the table. We look to the future and solve really interesting challenges that will unlock Upguard’s ability to grow sustainably and efficiently through optimized systems and processes. We’re looking for a smart, curious, and resourceful human to join our IT and Security Operations team at UpGuard. You’ll enjoy daily interactions with our globally distributed workforce, solving problems, improving systems, and helping to scale how we support and secure our environment. While our broader team spans enterprise technology operations, support, cybersecurity, and risk, this role focuses on core IT operations—with hands-on support, break/fix work, and meaningful contributions to enterprise and departmental IT enhancements. Our IT and Security Operations team also plays an active role in DevOps and InfraOps initiatives, contributing to tooling, automation, and the foundations that enable engineering velocity and operational excellence. You won’t just keep the lights on. You’ll help shape how we evolve. UpGuard is in the midst of a company-wide transformation, powered by cutting-edge data analytics, automation, and AI. You’ll be right at the heart of it, helping to drive the systems and support that make it all possible.

Job Responsibility:

  • Run daily, weekly, and periodic IT and security checklists, with a focus on Google SecOps/Chronicle monitoring
  • Perform health checks across GCP infrastructure, SaaS applications, and security tooling (alerts, compliance, CI/CD pipelines)
  • Troubleshoot security or infrastructure issues, document fixes, and raise follow-up actions
  • Collaborate with DevOps and InfraOps on platform-level and security-related issues
  • Identify and propose security and platform improvements as you gain business context
  • Implement automation, security tooling, and platform enhancements to strengthen cloud and SaaS environments
  • Contribute to scripts, dashboards, and operational improvements with a focus on security and compliance
  • Feed insights from day-to-day work into long-term IT security and operational strategy
  • Occasionally assist with IT support tasks across systems, hardware, and software
  • Prioritize tasks effectively and align timelines with stakeholders

Requirements:

  • Practical experience in IT and security operations across cloud infrastructure (GCP) and SaaS environments
  • Hands-on knowledge of Google SecOps/Chronicle for threat detection and incident response
  • Strong understanding of identity and access management (Okta), including SSO/MFA, SCIM, and RBAC concepts
  • Familiarity with automation platforms (Zapier, N8N) and scripting (Bash, PowerShell, Python) to streamline tasks and improve security operations
  • Experience managing and integrating enterprise SaaS applications in a security-conscious environment
  • Exposure to infrastructure-as-code tools like Terraform or similar, or willingness to learn
  • Thoughtful, empathetic approach to end-user support across globally distributed teams
  • Hands-on experience managing laptop fleets (macOS and ChromeOS)

Nice to have:

  • Exposure to SOC/SOC2 frameworks and compliance practices
  • Experience spotting trends in incoming attacks and unusual system activity
  • Ability to investigate logs and identify anomalies beyond standard monitoring
What we offer:
  • Monthly Lifestyle subsidy: Use this for financial, physical, and mental well-being
  • WFH set-up allowance: To ensure you have the right environment to work in, we will help you get set up within your first 3 months at UpGuard
  • $1500 USD annual Learning & Development allowance: To support your career development, all team members will be able to expense development opportunities against this allowance
  • Annual leave: PTO plus two additional UpGuardian leave days to give you time to recharge your batteries
  • 18 weeks paid Parental Leave: Irrespective of parenting role
  • Personal Leave Allowance: This includes sick & carer’s leave
  • Fully remote working environment: While we have physical offices in Sydney & Hobart, we do not mandate compulsory attendance
  • Top-spec hardware: All team members will be provided with top-spec laptops for their role
  • Generative AI subsidy: UpGuard provides paid subscriptions for all team members to access generative AI tools to support their work
  • Health Insurance: Health, dental, and vision insurance

Additional Information:

Job Posted:
December 27, 2025

Employment Type:
Fulltime
Work Type:
Remote work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Security Operations Analyst

IT Security Operations Analyst I

The IT Security Operations Analyst I is responsible for daily threat monitoring ...
Location
Location
Philippines; Malaysia , Sto. Tomas; Subang Jaya
Salary
Salary:
Not provided
amcor.com Logo
Amcor
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelors - IT or related field or comparable work experience
  • 1 to 5 years relevant experience
  • Desirable – Security+, CySA, CEH, GSEC, or similar
  • Ability to work on highly confidential projects
  • Energy and passion with an eye towards continuous improvement in self and team processes
  • Ability to effectively work cross-functionally with a proven high level of facilitation skills in a global environment
  • Excellent analytical and problem-solving skills, with the ability to analyze large datasets and identify anomalies
  • Ability to self-prioritize in a fast-paced environment and prioritize tasks based on the severity and impact of security incidents
  • Demonstrates drive, purpose, high engagement, and ownership in our high-performance culture
  • Excellent written and oral English communications
Job Responsibility
Job Responsibility
  • Perform real-time security log and event analysis taking appropriate mitigation actions within defined parameters
  • Escalating issues and alerts timely and as necessary
  • Monitor security systems to prevent or reduce issues from impacting production systems
  • Perform security investigations to determine root cause, impact, and remediation steps
  • Maintain security toolsets and reporting dashboards
  • Identify and analyze trending root cause of alerts and develop recommendations to reduce root cause risks
  • Identify trends in false positives and develop recommendations to improve alert effiency
  • Work to continuously improve security operations procedures and processes through automation
  • Effective communication skills, with the ability to convey technical information to non-technical stakeholders.
  • Manage with highest regard to sensitive and confidential information and situations
  • Fulltime
Read More
Arrow Right

Security Operations Analyst

Location
Location
India , Bengaluru
Salary
Salary:
Not provided
take2games.com Logo
Take-Two Interactive Software, Inc.
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 3+ years of experience in a Security Operations Center, incident response team, or cyber defense role
  • Hands-on experience with SIEM/SOAR platforms (e.g., Splunk, XSOAR and XSIAM) and endpoint detection solutions (e.g., CrowdStrike, SentinelOne)
  • Deep understanding of cybersecurity fundamentals, threat detection techniques, and attack frameworks such as MITRE ATT&CK
  • Comfortable analyzing logs and events from various systems including network devices, endpoints, cloud environments, and identity providers
  • Familiarity with scripting or automation (e.g., Python, PowerShell) to enhance investigation and response workflows is a plus
  • Experience with workflow and ticketing tools like ServiceNow or Jira for incident documentation and coordination
  • Strong written and verbal communication skills — able to clearly document findings, articulate risk, and support incident coordination across teams
  • Bachelor’s degree in Computer Science, Cybersecurity, Information Security, or Cybersecurity Engineering are a plus
  • One or more relevant certifications such as: CompTIA: Network+, Security+, CySA+, PenTest+, Cloud+ and Cloud Security: AWS Security Specialty, Google Professional Cloud Security Engineer and Microsoft Azure Security Engineer Associate are plus
Job Responsibility
Job Responsibility
  • Perform real-time security event monitoring, triage, and analysis across multiple platforms, using SIEM and EDR tools
  • Analyze log and telemetry data from diverse sources (e.g., firewalls, endpoint protection, IDS/IPS, application logs) to detect and respond to potential threats
  • Investigate and respond to security incidents, performing root cause analysis and supporting containment, eradication, and recovery efforts across endpoints, servers, cloud, and network environments
  • Conduct proactive threat hunting using behavioral analytics, threat intelligence, and hypothesis-driven queries to detect stealthy or novel attack techniques
  • Support the SOC's daily operational cadence, including participating in shift handoffs, reviewing detection effectiveness, and maintaining situational awareness of the global threat landscape
  • Contribute to the development and refinement of incident response processes, detection rules, and SOC playbooks
  • Collaborate with threat intelligence, engineering, and infrastructure teams to develop detection use cases and improve overall SOC effectiveness
  • Help shape SOC dashboards, reports, and playbooks that enhance visibility and response across business units and geographies
What we offer
What we offer
  • Discretionary bonus
  • Provident fund contributions
  • 1+5 medical insurance + top up options and access to Practo online Doctor consultation App
  • Employee assistance program
  • 3X CTC Life Assurance
  • 3X CTC Personal accident insurance
  • childcare services
  • 20 days holiday + statutory holidays
  • Gym reimbursement up to INR1150 per month
  • wellbeing program with the chance to earn up to $93 per annum
Read More
Arrow Right

Security Operations Analyst I

Our Security Operations Analyst I position supports our Virtual Network and Secu...
Location
Location
United States , North Wilkesboro
Salary
Salary:
Not provided
infusionpoints.com Logo
InfusionPoints
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • AS/BS degree in Information Technology, Computer Science, Engineering or related field
  • 1-3 years of hands-on deep technical experience
  • Security analysis, threat hunting, forensics, flow analysis, and log management experience
  • IDS/IPS management, PCAP carving, file extraction, and long tail analysis experience
  • Strong understanding of attacker tactics, techniques, and procedures
  • Understanding of endpoint and network security
  • Experience with or knowledge of vulnerability management and penetration testing of systems, applications, and networks
  • General understanding of industry standards, compliance, and legal guidelines: ISO 27001, FedRAMP, NIST 800-171, NIST 800-53, SOC 2, and HIPAA
  • Self-starter able to drive towards goals and manage time effectively
  • Analytical and the ability to think on the fly
Job Responsibility
Job Responsibility
  • Perform event and incident triage, threat hunting, and incident response
  • Use industry-leading commercial and open source software to detect, evaluate, triage, prioritize, and respond to security events
  • Support research and development, security module creation, automation, and process improvement
  • Support vulnerability management and penetration tests
  • Write both technical and executive incident reports when called upon
  • Continuous learning and improvement of security analysis skills to match current technical security challenges and innovations
What we offer
What we offer
  • competitive compensation and benefits package
  • Fulltime
Read More
Arrow Right

IT and Security Operations Analyst

UpGuard’s mission is to protect the world’s data. We obsessively seek out elegan...
Location
Location
Australia , Sydney; Hobart; Melbourne; Brisbane
Salary
Salary:
Not provided
https://www.upguard.com Logo
UpGuard
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Practical experience in modern system administration across cloud-based infrastructure (e.g. GCP) and SaaS environments
  • A strong understanding of identity and access management (e.g. Okta), including SSO/MFA, SCIM, and RBAC concepts and tooling
  • Familiarity with low-code/no-code automation platforms (e.g. Zapier, N8N) and a mindset for streamlining repetitive tasks
  • Experience managing and integrating enterprise SaaS applications, ideally in a high-growth or security-conscious environment
  • A working knowledge of scripting (e.g. Bash, PowerShell, Python) to automate tasks, support system health checks, or build internal tooling
  • Exposure to infrastructure-as-code tools like Terraform or similar — or a willingness to learn and contribute to InfraOps practices
  • A thoughtful, empathetic approach to end-user support across globally distributed teams
  • Hands-on experience supporting and managing laptop fleets (macOS and ChromeOS)
Job Responsibility
Job Responsibility
  • Enterprise IT Service Health (30%): Run daily, weekly, and periodic IT and security checklists
  • Troubleshoot issues, document fixes, and raise follow-up actions as needed
  • Perform health checks across infrastructure and DevOps (e.g. uptime, CI/CD, compliance, alerts)
  • Collaborate with DevOps and InfraOps on platform-level issues
  • General IT Support (40%): Monitor and action items in the IT support queue, with a proactive approach
  • Prioritize tasks effectively and align timelines with stakeholders
  • Deliver empathetic, solutions-oriented support across systems, hardware, and software
  • Project Work (30%): Identify and propose improvements as you gain business context
  • Work cross-functionally to implement automation, tooling, and platform enhancements
  • Contribute to scripts, dashboards, and operational improvements
What we offer
What we offer
  • Monthly Lifestyle subsidy: use this for financial, physical, and mental wellbeing
  • WFH set-up allowance: to ensure you have the right environment to work in, we will help you get set up within your first 3 months at UpGuard
  • $1,500 USD annual Learning & Development allowance: to support your career development all team members will be able to expense development opportunities against this allowance
  • Generous Annual Leave/PTO allowances: time to recharge your batteries
  • 18 weeks paid Parental Leave: irrespective of parenting role
  • Personal Leave allowance: this includes sick & carer’s leave
  • Fully remote working environment: while we have physical offices in Sydney & Hobart, we do not mandate compulsory attendance
  • Top-spec hardware: all team members will be provided with top-spec laptops for their roles
  • Personal device security & online privacy protection subsidy: UpGuard provides team members with a paid subscription to personal device security & online privacy protection platform
  • Generative AI subsidy: UpGuard provides paid subscriptions for all team members to access generative AI tools to support their work
  • Fulltime
Read More
Arrow Right

Security Operations Analyst

As a Security Operations Analyst within our Information Security Team you will p...
Location
Location
Portugal , Lisbon
Salary
Salary:
Not provided
https://www.tui.com Logo
TUI
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Demonstrable deep experience of design and build of systems integration, ideally in a security operations environment
  • strong technical and IT operations background, with strong experience
  • experience of working with Splunk or similar SIEM platforms, Service Desk systems and security monitoring tools desirable with experience in designing and developing these platforms
  • familiarity and experience with Windows, macOS, Linux, and Unix operating systems
  • computer networking and cloud technology fundamentals
  • understanding of Active Directory, LDAP, IDaaS (AAD)
  • rudimentary security knowledge and awareness of firewalls, proxies, antivirus, and IPS/IDS concepts
  • experience scripting in Python or PowerShell
  • experience using Microsoft Excel and Word
  • excellent written and verbal communication skills
Job Responsibility
Job Responsibility
  • Promote a security first culture at TUI
  • work with resolver teams to ensure that information security events and incidents are automatically generated, appropriately addressed and closed in local ticketing systems and ensure reporting on key performance indicators and service levels
  • adopt a pragmatic and ‘can-do’ attitude in everything you do, partnering with your colleagues across the TUI businesses and IT functions worldwide
  • build strong working relationships and influence others to do the right thing to Protect our Smile
  • monitor for alerts from security tools, including, but not limited to, security analytics platforms, automation tools, ticket management systems, user-reported alerts, and others
  • triage security alerts, including initial analysis to determine the validity of alerts and gather additional context
  • use network and host security tooling to perform additional investigation
  • work the full incident lifecycle from detection, investigation, response, to remediation for security alerts
  • contribute to the further development, maintenance, and standardization of SOC processes, policies, and procedures
  • work with other IT/security teams to identify areas for improvement around detection, investigation, and response
What we offer
What we offer
  • Attractive remuneration, bonus opportunity, exclusive travel perks & discounts, extensive health & wellbeing support, and more
  • flexible working: Work is something you do, not somewhere you go. We encourage a healthy work-life balance and offer hybrid or remote working models
  • opportunities to upskill, reskill and grow your career
  • access the TUI Tech Learning Hub to level-up and reach your ambitions
  • participate in our tech communities and collaborate on global projects and teams
  • get involved with incredible local charity and sustainability initiatives like the TUI Care Foundation and the Sustainable Tech Community.
  • Fulltime
Read More
Arrow Right

Security Operations Analyst

As a Security Operations Analyst within our Information Security Team you will p...
Location
Location
Portugal , Lisbon; Oporto; Barcelona; Madrid; Flexible
Salary
Salary:
Not provided
https://www.tui.com Logo
TUI
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Demonstrable deep experience of design and build of systems integration, ideally in a security operations environment
  • Strong technical and IT operations background
  • Experience of working with Splunk or similar SIEM platforms, Service Desk systems and security monitoring tools
  • Familiarity and experience with Windows, macOS, Linux, and Unix operating systems
  • Computer networking and cloud technology fundamentals
  • Understanding of Active Directory, LDAP, IDaaS (AAD)
  • Rudimentary security knowledge and awareness of firewalls, proxies, antivirus, and IPS/IDS concepts
  • Experience scripting in Python or PowerShell
  • Experience using Microsoft Excel and Word
  • Excellent written and verbal communication skills
Job Responsibility
Job Responsibility
  • Monitor for alerts from security tools
  • Triage security alerts
  • Use network and host security tooling to perform additional investigation
  • Work the full incident lifecycle from detection, investigation, response, to remediation for security alerts
  • Contribute to the further development, maintenance, and standardization of SOC processes, policies, and procedures
  • Work with other IT/security teams to identify areas for improvement around detection, investigation, and response
  • Research common and topical commodity and APT-based malware tactics and techniques in preparation for future attacks
  • Provide feedback on detection rules to help tune security tools and minimize false positives
  • Participate in SOC working groups and sub-teams to help generate and execute on new ideas for content, technology advancements, and proactive defence improvement projects
What we offer
What we offer
  • Attractive remuneration
  • Bonus opportunity
  • Exclusive travel perks & discounts
  • Extensive health & wellbeing support
  • Flexible working
  • Opportunities to upskill, reskill and grow your career
  • Access the TUI Tech Learning Hub
  • Participate in tech communities and collaborate on global projects and teams
  • Get involved with local charity and sustainability initiatives
  • Fulltime
Read More
Arrow Right

Security Operations Analyst

As a Security Operations Analyst within our Information Security Team you will p...
Location
Location
Portugal , Lisbon; Oporto; Barcelona; Madrid; Flexible
Salary
Salary:
Not provided
https://www.tui.com Logo
TUI
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Demonstrable deep experience of design and build of systems integration, ideally in a security operations environment
  • Strong technical and IT operations background
  • Experience with Splunk or similar SIEM platforms, Service Desk systems, and security monitoring tools
  • Familiarity with Windows, macOS, Linux, and Unix operating systems
  • Computer networking and cloud technology fundamentals
  • Understanding of Active Directory, LDAP, IDaaS (AAD)
  • Rudimentary security knowledge of firewalls, proxies, antivirus, and IPS/IDS concepts
  • Experience scripting in Python or PowerShell
  • Experience using Microsoft Excel and Word
  • Excellent written and verbal communication skills
Job Responsibility
Job Responsibility
  • Monitor for alerts from security tools
  • Triage security alerts
  • Use network and host security tooling to perform additional investigation
  • Work the full incident lifecycle from detection, investigation, response, to remediation for security alerts
  • Contribute to the further development, maintenance, and standardization of SOC processes, policies, and procedures
  • Work with other IT/security teams to identify areas for improvement around detection, investigation, and response
  • Research common and topical commodity and APT-based malware tactics and techniques
  • Provide feedback on detection rules to help tune security tools and minimize false positives
  • Participate in SOC working groups and sub-teams to help generate and execute on new ideas for content, technology advancements, and proactive defence improvement projects
What we offer
What we offer
  • Attractive remuneration
  • Bonus opportunity
  • Exclusive travel perks & discounts
  • Extensive health & wellbeing support
  • Flexible working models
  • Opportunities to upskill, reskill and grow your career
  • Access to TUI Tech Learning Hub
  • Participation in tech communities and collaboration on global projects and teams
  • Involvement in local charity and sustainability initiatives
  • Fulltime
Read More
Arrow Right

Security Operations Analyst

Location
Location
Spain , Valencia
Salary
Salary:
Not provided
united-its.com Logo
United ITs
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Knowledge of Transmission Control Protocol / Internet Protocol (TCP/IP) protocols
  • Deep knowledge of Microsoft Security Tools (e.g. M365, Cloud App Security, Azure, Defender for Endpoints, Azure Security, Azure Sentinel and XDR
  • Deep Knowledge of Cloud technologies (e.g. Azure, AWS and GCP)
  • Deep knowledge of SIEM tools like Splunk, QRadar, ArcSight, MS Sentinel, ELK Stack
  • Knowledge of at least one EDR solution (MS Defender for Endpoint, SentinelOne, Crowdstrike)
  • Knowledge of email security, network monitoring, and incident response
  • Knowledge of Linux/Mac/Windows
  • A minimum of five (5) years of relevant experience in information technology field, including triage of alerts and supporting security incidents
  • Proven experience with the usual toolbox available in a SOC (e.g., SIEMs, EDRs), able to autonomously perform technical analysis of security threats and collaborate with Incident Response team
  • Trouble ticket generation and processing experience
What we offer
What we offer
  • Teleworking option: Yes (up to 4 days per week for consultants working from Valencia, Spain)
  • Fulltime
Read More
Arrow Right
Welcome to CrawlJobs.com
Your Global Job Discovery Platform
At CrawlJobs.com, we simplify finding your next career opportunity by bringing job listings directly to you from all corners of the web. Using cutting-edge AI and web-crawling technologies, we gather and curate job offers from various sources across the globe, ensuring you have access to the most up-to-date job listings in one place.