- Company Name
- Fluidstack
- Job Title
- Security Analyst
- Job Description
-
**Job Title:** Security Analyst
**Role Summary:**
Execute daily security operations—including monitoring, threat detection, incident triage, and response—using existing SIEM/EDR tooling. Identify capability gaps, evaluate and implement new security solutions, and maintain detection rules. Serve as the main technical liaison with managed security service providers and corporate partners to share intelligence, manage escalations, and optimize service delivery. Drive continuous improvement of playbooks, automation, and threat‑model awareness in a fast‑paced environment.
**Expectations:**
- 4–8 years in security operations, incident response, or a related field.
- Proven hands‑on experience with SIEM, EDR, IDS/IPS, log analysis, and event correlation.
- Deep knowledge of ATT&CK tactics, techniques and common attack vectors.
- Ability to manage multiple priorities independently and communicate findings clearly.
**Key Responsibilities:**
- Conduct daily security monitoring and analysis of alerts, logs, and events.
- Triage and investigate incidents, determine scope/severity, and execute response playbooks.
- Document incidents, findings, and remediation actions in incident‑reporting systems.
- Identify gaps in current security tooling and processes; research, evaluate, and recommend new solutions.
- Lead proof‑of‑concepts and oversee implementation of approved security technologies.
- Develop and refine detection use‑cases and rules for SIEM/EDR platforms.
- Act as the primary technical liaison with MSSPs and corporate partners: coordinate threat‑intel sharing, incident escalations, and service optimization.
- Contribute to playbook development, tabletop exercises, and continuous improvement initiatives.
- Stay updated on emerging threats, vulnerabilities, and industry trends.
- Identify automation opportunities to enhance operational efficiency.
**Required Skills:**
- SIEM platforms (e.g., Splunk, ELK, QRadar).
- Endpoint Detection & Response tools (e.g., CrowdStrike, SentinelOne).
- Network security monitoring (IDS/IPS, network flow analysis).
- Vulnerability management systems.
- Log analysis and event correlation techniques.
- Incident response methodologies and best practices.
- Strong analytical, troubleshooting, and problem‑solving abilities.
- Excellent communication and documentation skills.
- Independent work style and ability to manage multiple priorities.
**Preferred Skills:**
- Experience liaising with MSSPs.
- Cloud security monitoring (AWS, Azure, GCP).
- Scripting/automation (Python, PowerShell).
- Familiarity with SOC 2, ISO 27001, NIST CSF compliance frameworks.
**Required Education & Certifications:**
- Bachelor’s degree in Computer Science, Information Security, or a related field (preferred).
- Professional certifications such as CompTIA Security+, CISM, CISSP, or CEH are advantageous.
San francisco, United states
On site
Junior
28-02-2026