About the Role
The role involves identifying, investigating, and mitigating security threats through continuous monitoring and incident response activities.
Responsibilities
- Monitor security alerts across networks and endpoints
- Investigate potential threats using log and event data
- Analyze user and entity behavior for anomalies
- Respond to confirmed security incidents promptly
- Use threat intelligence to enhance detection capabilities
- Collaborate with IT and security teams during incidents
- Document findings and actions taken during investigations
- Support forensic analysis when required
- Maintain up-to-date knowledge of emerging threats
- Improve detection rules based on attack patterns
- Conduct regular threat-hunting activities
- Evaluate security tools for effectiveness
- Escalate complex incidents to senior staff
- Participate in on-call rotation for incident response
- Assist in vulnerability assessment follow-up
- Track threat actor tactics, techniques, and procedures
- Support compliance and audit requirements
- Generate reports on security events and trends
- Implement automated response workflows
- Ensure data protection policies are enforced
- Review access logs for unauthorized activity
- Assist in security awareness initiatives
- Validate security control effectiveness
- Maintain incident response playbooks
- Contribute to post-incident reviews
Compensation
Competitive salary and benefits package
Work Arrangement
Hybrid work model
Team
Part of the cybersecurity operations team
Why This Role Matters
Cyber threats are growing in complexity, and timely detection is critical to minimizing impact. This role plays a central part in identifying breaches early and reducing exposure.
Technology Stack
The team uses advanced analytics, machine learning, and real-time monitoring tools to detect suspicious behavior across file systems, email, and cloud platforms.
Career Growth
Opportunities exist to specialize in threat intelligence, digital forensics, or security automation based on interest and performance.
Onboarding Process
New hires undergo a structured onboarding program including system access setup, security training, and mentorship from senior analysts.
Performance Expectations
Analysts are expected to reduce mean time to detect and respond, maintain high accuracy in triage, and contribute to improving detection logic.
Available for qualified candidates
