As a hands-on role, the Security Analyst is member of Fortraâs Corporate Security Operations Center (SOC) team. The role is responsible for managing cybersecurity controls and processes to identify threats, respond to alerts, and recover from incidents to protect the organization and its assets. The focus is Fortra globally and monitoring our multi-platform infrastructure (Entra ID, AWS, Azure, Windows, Linux, network, etc.) On-call is required.
WHAT YOU'LL DO
- Monitor, investigate, and respond to security alerts and incidents, including phishing attempts, malware infections, and unauthorized access.
- Conduct in-depth analysis of security events to determine root causes and recommend effective remediation actions.
- Develop and maintain comprehensive security documentation, including incident playbooks, response plans and overall security procedures.
- Own and execute projects independently, own and run incidents from start to finish.
- Work on improving monitoring and response capabilities in AWS and Azure environments
- Collaborate with Cloud Operations and IT teams to ensure security measures are integrated into all aspects of the organizationâs infrastructure.
- Support knowledge sharing across the organization to ensure processes and projects meet internal and external security policies and compliance requirements.
- Provide guidance and support to junior team members and other departments on security-related matters.
- Pursue relevant industry certifications (e.g., AWS, Azure, Sec+, Net+) to validate skills and knowledge in specific areas of security.
- Other duties as assigned
QUALIFICATIONS
- Ideally educated to a degree level in Cyber Security or Computer Science or equivalent certifications
- Cybersecurity certifications like Sec+, GSEC, SSCP or one of the AWS or Azure Security Engineering certifications preferred
- 3+ years background in SOC roles
- Solid understanding of IAM, network-, and cloud- technologies, Windows & Linux operating systems, and cybersecurity best practices.
- Proficiency in security tools such as SIEM, IDS/IPS, endpoint detection and response (EDR), and vulnerability scanners.
- Strong analytical and investigative skills, with the ability to think critically and problem-solve under pressure.
- Excellent communication skills, including the ability to convey technical information to non-technical audiences.
- Ability to work independently and collaboratively in a fast-paced environment.
- Experience with Azure Sentinel, Sentinel One, and Jira are beneficial
- Programming / Scripting (Python, PowerShell, Bash) skills
ID:3039
Please mention the word **PROFOUNDLY** and tag RMTguMjMxLjEzMC42Nw== when applying to show you read the job post completely (#RMTguMjMxLjEzMC42Nw==). This is a beta feature to avoid spam applicants. Companies can search these words to find applicants that read this and see they're human.