Cybersecurity Analyst - Security Operations Center

GreyM • United State
Remote
Apply
AI Summary

Join GreyM's global cybersecurity team to strengthen detection capabilities, enhance automation, and contribute to the continuous evolution of the financial institutions' security posture. Conduct in-depth SOC analysis, triage, incident reporting, and threat hunting. Build security detection content within Splunk Enterprise Security to strengthen monitoring capabilities.

Key Highlights
Conduct in-depth SOC analysis, triage, incident reporting, and threat hunting
Build security detection content within Splunk Enterprise Security
Collaborate across incident management and automation platforms
Technical Skills Required
Splunk Enterprise Security Splunk Core Python PowerShell Proofpoint TAP/TRAP CrowdStrike Falcon
Benefits & Perks
100% Remote work
Competitive compensation based on experience and expertise
Technology Allowance

Job Description


As part of our global cybersecurity team, this role focuses on identifying, analyzing, and responding to complex security incidents using advanced SecOps tools and modern threat intelligence. The position offers an opportunity to strengthen detection capabilities, enhance automation, and contribute to the continuous evolution of the financial institutions security posture.


Responsibilities:

  • Conduct in-depth SOC analysis, triage, incident reporting, and threat hunting
  • Build security detection content within Splunk Enterprise Security to strengthen monitoring capabilities
  • Collaborate across incident management and automation platforms to contain threats, resolve alerts, and refine detection logic.
  • Support continuous improvement by tuning alerts, optimizing and managing logs, and automating repetitive tasks


Must-Haves:

  • 3+ years of practical experience in a Security Operations Center as a cybersecurity analyst.
  • Proven ability to manage the full incident lifecycle, including triage, response, threat detection, and alert optimization.
  • Proficiency with Splunk Enterprise Security/Core, including building and fine-tuning complex SPL queries.
  • Working knowledge of email and endpoint protection platforms, such as Proofpoint TAP/TRAP and CrowdStrike Falcon.


Nice-to-Haves:

  • Scripting experience with Python or PowerShell
  • Experience with Wiz, Netskope, or Zscaler
  • Certifications such as CompTIA Sec+, Net+, OSCP, or CySA+


Offer Details:

  • 100% Remote work, will remain remote permanently!
  • Working schedule: cover 9 AM - 5 PM Tbilisi time
  • Salary: We offer highly competitive compensation that will be based on your experience and expertise
  • Technology Allowance: You will benefit from a generous budget allocated for computer, office equipment, or even a Starlink to ensure you have the tools you need to excel in your role


Subscribe our newsletter

New Things Will Always Update Regularly