Sr Security Analyst



Keep people safe and organizations running with Everbridge. Empower Resilience. Anticipate, mitigate, respond to, and recover from critical events.

View company page

We are seeking a dedicated and experienced Sr Security Analyst to bolster our Security Operations and Incident Response capabilities. In this role, you will play a pivotal part in fortifying our global Information Systems security infrastructure and responding effectively to potential security threats. Your responsibilities will encompass the daily operations of our security technologies, alongside proactive analysis, and response to security incidents. Collaboration with our Information Services team will be integral to maintaining and enhancing our organization's security posture and safeguarding our data assets.
About the Team:As a valued member of our Cyber Intelligence Center /Security Operations team, you will advocate a pragmatic approach to proposing and implementing security solutions. You will actively contribute to the continual analysis of our security logs and posture to uphold our organization's security and situational awareness regarding potential threats.

What you'll do

  • Responsibilities and Technical Requirements: 
  • Security Monitoring and Analysis:
  • Monitor security alerts and events from various sources, including SIEM (Security Information and Event Management) tools.
  • Conduct in-depth analysis of security incidents to determine the scope, impact, and severity.
  • Incident Triage and Investigation:
  • Ability to identify abuse/ Fraud patterns on Cloud Platform
  • Perform initial triage of security incidents, prioritizing and escalating as necessary.
  • Conduct detailed investigations to identify the root cause of security incidents and recommend remediation actions.
  • Threat Detection and Analysis:
  • Utilize threat intelligence and analyse patterns to detect emerging cybersecurity threats.
  • Collaborate with other SOC analysts and teams to improve detection capabilities.
  • Investigate signs of compromise, utilizing your problem-solving skills and knowledge of cyber-attacks and data analysis (phishing, Ransomware, account compromise, DDOS)
  • Zero-day attack analysis and control, Analyse end user system for attack related incidents and share RCA
  • Incident Response:
  • Assist in coordinating and executing incident response procedures.
  • Strong understanding of cybersecurity concepts, attack vectors, and defence mechanisms.
  • Analytical mindset and the ability to think critically under pressure.
  • Documentation and Reporting:
  • Document incident details, investigation, analysis findings, and response actions.
  • Generate and communicate incident reports to relevant stakeholders.
  • Preparing disaster recovery plans / tabletop exercise / PEN Test / weekly monthly metric reports
  • Tool Management:
  • Operate and manage security tools, including sumo logic, defender, Qualys, Sophos, O365, Phislabs, Litmos, Service desk, Jira, confluence, datadog
  • Recommend improvements to enhance the effectiveness of security tools.
  • Developing, configuring, and deploying monitoring tools and scripts for applications and systems
  • Exposure on Terraform, Git, workflow  
  • Business Support:
  • Participate in business and technology initiatives, contributing as an information security professional to define security-related processes and procedures.
  • Engage in internal and third-party audits of the company’s information security policies, procedures, and operational duties, supporting remediation efforts as necessary.
  • Collaborating with product development, information technology (IT) and architecture teams to evaluate and implement new services based on requirements.

What you'll bring:

  • Projects:
  • Coordinate and execute security projects aligned with the global security strategy, evaluating the security posture of the company and related data assets.
  • Stay informed on the latest information security technologies, methodologies, and events, providing feedback on the security aspects or impact of non-security-related technology.
  • Liaise with external vendors and service providers to ensure the efficacy of security solutions and services.
  • Certification:
  • CompTIA Security+, Certified Ethical Hacker (C|EH), CSA or equivalent are highly desirable.
Apply now Apply later
  • Share this job via
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: Audits C Cloud CompTIA Confluence DDoS Incident response Jira Monitoring Qualys Security strategy SIEM SOC Strategy Terraform Threat detection Threat intelligence

Perks/benefits: Team events

Region: Asia/Pacific
Country: India
Job stats:  1  0  0
Category: Analyst Jobs

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.