Security Operations Analyst

1 hour, 48 minutes ago
Full-time
Junior
Cybersecurity
AlphaSense

AlphaSense

AlphaSense develops an artificial intelligence-based search platform that enables investment and corporate professionals to quickly access and analyze extensive financial data and market insights from over 500 million documents, enhancing decision-maki...

Internet Software & Services
251-1K
Founded 2011
$770M raised

Description

  • Monitor and triage security alerts across SIEM, EDR, cloud security, identity, and other platforms.
  • Perform initial investigation on escalated events by collecting and correlating evidence across log sources.
  • Execute containment and remediation actions within defined escalation thresholds.
  • Maintain accurate and timely incident documentation in the tracking system.
  • Contribute to YARA-L rule development and tuning in Chronicle/Google SecOps.
  • Assist with CrowdStrike Falcon IOA and prevention policy maintenance.
  • Review threat intelligence feeds and correlate IOCs against internal telemetry.
  • Identify detection gaps and recommend improvements to security coverage.
  • Triage cloud security findings and investigate identity anomalies such as suspicious logins and MFA bypass attempts.
  • Author and maintain SOC runbooks and triage playbooks, and participate in shift handoff knowledge transfer.

Requirements

  • 2–4 years of experience in SOC, incident response, or security operations.
  • Bachelor's degree (B. Tech) from a Tier 1 or Tier 2 institution.
  • Hands-on experience with a SIEM platform such as Chronicle, Splunk, Sentinel, or equivalent.
  • Familiarity with EDR tooling, preferably CrowdStrike Falcon.
  • Foundational understanding of cloud security concepts across AWS or GCP.
  • Working knowledge of identity threat patterns such as credential stuffing, MFA fatigue, and account takeover.
  • Ability to read and interpret authentication, network, endpoint, and cloud audit logs.
  • Strong written communication skills for clear incident documentation and escalation summaries.
  • Exposure to CSPM/CWPP platforms (preferred).
  • Scripting proficiency in Python or similar for basic automation and log parsing (preferred).
  • Relevant certifications such as CompTIA Security+, CySA+, GCIH, or GCIA (preferred).

Interested in this position?

Apply directly on the company website

Apply Now

Similar Roles

Senior Security GRC Analyst

Rubrik 1K-5K IT Services

Rubrik is hiring a Compliance Analyst to help run and continuously improve its security compliance program across multiple regulatory and control frameworks.

HIPAA JIRA Power BI
11 hours, 4 minutes ago

Intelligence Analyst

ZeroFox 251-1K Internet Software & Services

ZeroFox is hiring an Intelligence Analyst to research and assess physical, cyber, geopolitical, reputation, and compliance threats for client-focused intelligence reporting and risk analysis.

Cybersecurity DNS
13 hours, 55 minutes ago

Sr. Information Systems Security Officer II (6587)

MetroStar 251-1K IT Services

MetroStar is hiring an Information Systems Security Officer to support government clients in achieving and sustaining Authority to Operate for federal information systems.

Cybersecurity Encryption
18 hours, 29 minutes ago

Information Security Analyst

Mindera 1K-5K Internet Software & Services

Mindera is seeking a mid-level Information Security Analyst to support security operations across its global locations, helping monitor infrastructure, manage vulnerabilities, respond to incidents, and strengthen the company’s security posture.

Agile AWS Bash CrowdStrike GCP Linux macOS Palo Alto Python
19 hours, 38 minutes ago

You're on a roll! Sign up now to keep applying.

Sign Up

Already have an account? Log in

Used by 14,729+ remote workers