- Company Name
- Mizuho
- Job Title
- Security Operations Analyst
- Job Description
-
**Job Title:** Security Operations Analyst
**Role Summary:**
Lead member of the Security Operations team responsible for day‑to‑day monitoring, detection, and response to cybersecurity incidents. Own the end‑to‑end incident response (IR) lifecycle, drive automation, and collaborate with internal stakeholders and external vendors to remediate risks and improve the organization’s security posture.
**Expectations:**
- Deliver timely and effective response to security events in accordance with the incident response plan.
- Maintain high‑fidelity alerting while reducing false positives through automation and tuning.
- Communicate technical findings clearly to senior management and produce actionable documentation.
- Continuously enhance processes, tools, and integrations to strengthen overall cyber hygiene.
**Key Responsibilities:**
- Operate and support security tools (SIEM, IDS/IPS, EDR, ServiceNow, Email Protection, etc.).
- Manage relationships with SOC, MSSP, and other security vendors.
- Design, develop, and maintain SOAR playbooks and detection models; create SPL/EDR alerts.
- Conduct advanced incident response, forensic analysis, and malware analysis.
- Lead incident coordination, documentation, and post‑incident reporting (IR playbooks, KRIs/KPIs).
- Partner with security engineering for investigations and remediation.
- Implement and evaluate new cybersecurity technologies; provide technical guidance for hardware, network, and application security.
- Produce formal and informal reports on incidents, vulnerabilities, and compliance status.
- Drive project‑based initiatives to mature detection and response capabilities across the enterprise.
**Required Skills:**
- 7–9+ years of cybersecurity experience, including ≥4 years in incident response/investigation.
- Proficiency with SIEM/SOAR platforms, alert tuning, and playbook creation.
- Strong scripting abilities (PowerShell, Python preferred).
- Deep log analysis and correlation across large data sets.
- Automation‑first mindset for process improvement.
- Solid understanding of networking (TCP/IP, routing, switching, firewalls, IDS/IPS, packet capture).
- Experience with proxies, web servers, cloud environments, and virtualization security.
- Knowledge of Linux, Windows, and endpoint security fundamentals.
- Excellent written and verbal communication; ability to convey complex technical concepts to non‑technical audiences.
- Strong analytical, problem‑solving, and self‑learning capabilities.
**Required Education & Certifications:**
- Bachelor’s degree in Computer Science, Engineering, Information Security, or related field (Master’s preferred).
- Relevant certifications (e.g., CISSP, CISM, GCIH, GCFA, CEH, or equivalent) are strongly desired.