Senior Security Analyst (f/m/d)

Contentful Contentful · Enterprise · London, United Kingdom · Security

Senior Security Analyst role focused on incident response, threat detection, and contributing to the growth and design of the security program. Requires experience in alert investigation, incident management, and understanding of security principles and frameworks. The role involves working independently and collaboratively in a global team, with a focus on continuous improvement and risk mitigation.

What you'd actually do

  1. Perform daily alert investigation and response in a hybrid environment.
  2. Conduct detail-oriented analysis across challenging and complex ecosystems.
  3. Communicate investigation and threat updates to technical and non technical senior leaders.
  4. Work collaboratively across internal functions to identify, respond, and remediate security issues.
  5. Investigate and lead incidents of medium size and complexity.

Skills

Required

  • Security Operations experience
  • alert triage and investigation
  • detection and tuning
  • Security Incident Response
  • log analysis
  • live response
  • forensics
  • attacker Tactics, Techniques, and Procedures
  • cloud-native and traditional environments attacker techniques
  • OSI Model
  • TCP/IP
  • Layer 7 protocols
  • host analysis on Mac, Windows, & Linux systems
  • SIEM
  • EDR
  • AntiVirus
  • malware analysis
  • AWS audit and security services
  • SaaS platforms and identity systems investigations
  • cloud service providers investigations (AWS, GCP, Azure)
  • cross-platform and hybrid environment investigations
  • detection use cases
  • modern engineering and detection engineering practices

Nice to have

  • DevOps principles
  • risk mitigation
  • continuous improvement
  • user training and awareness programs
  • tool selection
  • Work-Life balance
  • passion for solving complex security problems in innovative and scalable ways

What the JD emphasized

  • 5+ years of Security Operations experience, including alert triage and investigation
  • 2+ detection and tuning experience, inclusive of Security Operations experience
  • 2+ years of Security Incident Response experience
  • Ability to support on call and occasional off-hours incident response efforts
  • Proficiency in analysis fundamentals (e.g., log analysis, live response, forensics, etc.)
  • Mastery of investigation methods and adept at handling new and unfamiliar cases.
  • Firm understanding of attacker Tactics, Techniques, and Procedures
  • Proficiency in attacker techniques in cloud-native and traditional environments.
  • Strong technology fundamentals (e.g., OSI Model, TCP/IP, Layer 7 protocols , etc.)
  • Ability to perform detailed host analysis on Mac, Windows, & Linux systems.
  • Hands-on experience using security technologies (e.g., SIEM, EDR, AntiVirus, etc.)
  • Hands-on experience with malware analysis using dynamic and static analysis tools.
  • Expertise in AWS audit and security services to investigate cloud centric threats
  • Proficiency investigating incidents across SaaS platforms and identity systems
  • Experience performing investigations in cloud service providers (e.g., AWS, GCP, Azure, etc.)
  • Practical experience with cross-platform and hybrid environment investigations
  • Ability to interpret designs and enumerate actionable detection use cases
  • Familiarity with modern engineering and detection engineering practices