This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
Blue Yonder, a leading supply chain software company, is seeking a Sr Cybersecurity Incident Response Analyst (Threat Hunting) to join its Security Operations (SOC) team. The successful candidate will be responsible for assisting with the organization's Tier 2 incident response efforts in the event of a security breach or cyber-attack. This role requires strong technical skills, attention to detail, and the ability to work under pressure. The Sr Incident Response Analyst will work closely with the Security team to develop and maintain incident response plans, conduct investigations, and provide technical guidance and support during incident response activities. Blue Yonder is seeking a candidate with a deep passion for cybersecurity, eager to stay ahead of emerging threats and continuously enhance our security posture. The ideal candidate is driven, proactive, and committed to protecting the enterprise through effective threat detection, response, and mitigation strategies.
Job Responsibility:
Monitor and Analyze Security Alerts – Review alerts generated by security systems, appliances, and logs to determine the appropriate course of action to protect the enterprise and reduce overall risk
Incident Triage and Response – Quickly assess, prioritize, and respond to security incidents, ensuring timely containment, eradication, and recovery to minimize business impact
Root Cause Analysis (RCA) – Investigate security incidents to determine root causes, attack vectors, and vulnerabilities, providing recommendations to reduce the attack surface and prevent recurrence
Threat Hunting and Proactive Defense – Conduct proactive threat-hunting activities based on intelligence, anomalies, and adversary tactics to identify and mitigate threats before they escalate
Collaboration with Cross-Functional Teams – Work closely with IT, engineering, legal, compliance, and other teams to coordinate incident response efforts and ensure an effective security posture
Incident Documentation and Reporting – Maintain detailed documentation of security incidents, response actions, and lessons learned, ensuring continuous improvement in security processes
Develop and Improve Incident Response Playbooks – Enhance and maintain incident response procedures, ensuring alignment with industry best practices and emerging threats
Security Awareness and Training – Provide guidance, training, and mentorship to SOC analysts and IT staff on security threats, incident handling, and response best practices
Threat Intelligence Integration – Leverage threat intelligence sources to stay informed on evolving cyber threats and proactively adjust security strategies to defend against them
Requirements:
Bachelor's degree in Computer Science, Information Security, or related equivalent experience
5+ years of experience in information security or cybersecurity as an analyst, engineer or consultant
MUST have experience with incident response methodologies and tools (e.g. SANS IR, EDR, SIEM, Threat Intelligence, etc.)
Strong technical skills and attention to detail
Excellent verbal and written communication skills
Ability to work independently and as part of a team
Ability to work under pressure and in a fast-paced environment
Strong problem-solving skills and a proactive approach to work
Knowledge of security frameworks such as NIST and ISO 27001
Familiarity with security regulations and standards (e.g. PCI DSS, HIPAA, etc.)
Strong familiarity with cloud security technologies and frameworks across major cloud providers (AWS, Azure, Google Cloud) is essential
Experience with cloud-native security monitoring, incident response in cloud environments, and threat detection techniques to protect workloads, data, and identities in hybrid and multi-cloud architectures