This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
The Security Operations Analyst is a member of the IT Infrastructure & Security Department. This role is responsible for day-to-day security operations, security event analysis, and incident response execution across SpectraMedix’ on-premises, co-located datacenter and Microsoft Azure cloud tenant. The Security Operations Analyst works closely with the IT Security Analyst and reports to the CISO/VP, Information Technology & Security. This position serves as the primary responder to security alerts, including endpoint protection alerts, server and system events, and reported intrusion/phishing attempts. The Security Operations Analyst performs alert triage, investigation, containment actions, and escalation in accordance with documented runbooks and the System Security Plan.
Job Responsibility:
Monitor, triage, and investigate security alerts generated by security tools (e.g., Sophos, Azure Monitor, Log360, server OS and application logs)
Act as the first responder for confirmed security events, including malware detections, suspicious logins, anomalous system behavior, and phishing reports
Escalate incidents to the IT Security Analyst or Incident Response team with documented findings and evidence
Maintain accurate incident records, timelines, and response actions in incident tracking systems
Execute daily, weekly, monthly, quarterly, and annual security operational tasks as defined in the System Security Plan and security runbooks
Review endpoint, server, and system logs for indicators of compromise or policy violations
Validate vulnerability scan results and assist with remediation tracking
Assist with access reviews, security control verification, and operational evidence collection
Analyze reported phishing emails and user-submitted security issues or concerns
Determine legitimacy, remove malicious content, and take corrective action (e.g., user guidance, IOC blocking)
Track phishing trends and recurring patterns for reporting to the security team
Work closely with IT infrastructure, DevOps, data management and application development teams during incident investigations and remediation
Support the IT Security Analyst during audits, assessments, and tabletop exercises by providing operational evidence
Follow defined escalation paths and incident severity classifications
Provide feedback on alert quality, false positives, and detection gaps
Contribute to improving SOC procedures and runbooks, incident response procedures, and alert tuning
Stay current on common attack techniques, indicators, and defensive best practices relevant to healthcare data environments
Requirements:
2–4 years of experience in security operations, SOC, or incident response roles
Hands-on experience monitoring and responding to security alerts
Familiarity with endpoint detection and response (EDR), SIEM, and log monitoring tools
Working knowledge of: Networking items (TCP/IP, DNS, HTTPS, SSH, SFTP). Authentication and access control concepts. Intrusion detection, malware, phishing, and common attack techniques
Experience working within documented procedures and escalation models
Must have worked with US based clients in onsite/off shore delivery model
Strong verbal and written communication, technical articulation, listening, and presentation skills are essential
Should have proven analytical and problem-solving skills
Demonstrated expertise in prioritization, time management, and stakeholder management (both internal and external) is necessary
Should be a quick learner, self-starter, proactive, and an effective team player
Must have experience working under tight deadlines within a matrix organizational structure