Junior Cybersecurity Analyst

SailPoint Mexico
Remote
Apply
AI Summary

SailPoint's Cybersecurity organization is seeking a Junior Security Analyst to support the SOC team in monitoring, analyzing, and responding to security events. The ideal candidate will have a passion for cybersecurity and a strong analytical mindset. The role requires a bachelor's degree in Cybersecurity, Computer Science, or a related field, and 0-2 years of experience in cybersecurity or IT.

Key Highlights
Support the SOC team in monitoring and responding to security events
Assist in documenting events and maintaining response playbooks
Participate in purple team exercises and threat intelligence processes
Key Responsibilities
Monitor security events using SIEM systems and EDR tools
Perform initial triage of events and events of interest under supervision
Assist in documenting events and maintaining response playbooks
Technical Skills Required
Security Information and Event Management (SIEM) systems Endpoint detection/response (EDR) tools Splunk QRadar Purple teaming concepts Threat intelligence processes
Benefits & Perks
Remote work
Flexible work arrangement
Nice to Have
CompTIA Security+
CySA+

Job Description


SailPoint’s Cybersecurity organization is seeking a Junior Security Analyst with a passion for cybersecurity and protecting the organization.

The role is an entry-level role supporting the SOC team in monitoring, analyzing, and responding to security events and events of interest. This role focuses on learning foundational cybersecurity concepts, assisting with basic event analysis, and gaining exposure to purple teaming and threat intelligence processes. Applicants should embrace the opportunity to work across diverse platforms with a variety of tools and will play a key role as we continually improve our capabilities.

The ideal candidate will embody SailPoint's 4 I’s of Integrity, Individuals, Impact, and Innovation. They will embrace new challenges and contribute positively to our established team of talented and dedicated teammates to achieve our security objectives.

This role reports directly to the Americas SOC Manager, can be remote anywhere in Mexico, and will be working a mid-day shift with hours from 1:00 PM-10:00 PM CDT.

Responsibilities:

  • Monitor security events using Security Information and Event Management (SIEM) systems and endpoint detection/response (EDR) tools.

  • Perform initial triage of events and events of interest under supervision, escalating potential incidents to senior team members as needed.

  • Assist in documenting events and maintaining response playbooks for events of interest and potential incidents.

  • Support proactive threat monitoring by reviewing logs and alerts for suspicious activity.

  • Participate in foundational purple team exercises, such as observing tabletop simulations or blue/red team collaborations, to understand detection and response gaps.

  • Assist in collecting and organizing threat intelligence data (e.g., indicators of compromise [IOCs]) from open-source feeds or internal reports.

  • Conduct basic risk enumeration tasks, such as identifying vulnerabilities using provided scanning tools.

  • Engage in training to learn threat hunting basics and threat intelligence fundamentals.

  • Leverage provided resources to continuously increase knowledge of tools and best practices in forensics, incident response, and your understanding of advanced persistent threats, including tools, techniques, and procedures of attackers

Requirements: 

  • Bachelor’s degree in Cybersecurity, Computer Science, or related field (or equivalent experience).

  • 0–2 years of experience in cybersecurity or IT.

  • Basic understanding of networking, operating systems (Windows/Linux), and security principles.

  • Familiarity with SIEM tools (e.g., Splunk, QRadar) and EDR platforms.

  • Interest in purple teaming concepts and threat intelligence processes.

  • Strong analytical skills and eagerness to learn.

  • Relevant certifications (e.g., CompTIA Security+, CySA+) are preferred but not required.     

Desired:

  • Ability to quickly pick up and learn new technologies

  • Able to collaborate with cross-functional teams

  • A willingness to be challenged and a strong desire to learn

  • English written and spoken proficiency and communications skills

  • A foundational understanding of applications, networks, cloud architecture, and coding concepts

The Path to Success (Milestones):

  • 30-Day Milestones (The "Learning" Phase):

    • Build familiarity with the primary security tools (SOAR, SIEM, EDR), demonstrating the ability to log in and navigate the systems.

    • Understand how to locate and open security events and where key information resides.

    • Begin shadowing senior team members to understand the basics of the triage process.

  • 60-Day Milestones (The "Connecting" Phase):

    • Begin to independently identify the appropriate next steps in an investigation based on the event type (e.g., knowing to look at a process tree in EDR for a malware event).

    • Show proficiency in navigating to the correct information within the security stack without direct guidance.

    • Start performing basic triage on low-level events with supervision.

  • 90-Day Milestones (The "Contribution" Phase):

    • Can articulate the "what" and "why" of investigation steps for basic security events.

    • Demonstrate a foundational understanding of the environment and can triage common alerts by following established playbooks.

  • 6-Month Milestones (The "Performance" Phase):

    • Triage events independently, following established documentation and processes.

    • Demonstrate comfort in performing all subtasks required for an investigation and know when it is appropriate to escalate.

    • Actively incorporate feedback from the QA process to improve investigation quality.

  • 1-Year Milestones (The "Mastery" Phase):

    • Triage events consistently and confidently, with investigation quality in line with team standards.

    • Require minimal feedback for common event types.

    • Start identifying potential areas for rule tuning, security control and process improvements.



SailPoint is an equal opportunity employer and we welcome all qualified candidates to apply to join our team.  All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, protected veteran status, or any other category protected by applicable law.  

Alternative methods of applying for employment are available to individuals unable to submit an application through this site because of a disability. Contact applicationassistance@sailpoint.com or mail to 11120 Four Points Dr, Suite 100, Austin, TX 78726, to discuss reasonable accommodations.  NOTE: Any unsolicited resumes sent by candidates or agencies to this email will not be considered for current openings at SailPoint.


Similar Jobs

Explore other opportunities that match your interests

Cyber Defense Engineer

Cyber Security
5d ago

Premium Job

Sign up is free! Login or Sign up to view full details.

•••••• •••••• ••••••
Job Type ••••••
Experience Level ••••••

randstad méxico

Mexico

Network Security Architect

Cyber Security
2w ago

Premium Job

Sign up is free! Login or Sign up to view full details.

•••••• •••••• ••••••
Job Type ••••••
Experience Level ••••••

Insight Global

Mexico
Visa Sponsorship Relocation Remote
Job Type Part-time
Experience Level Entry level

world future energy summit

Australia

Subscribe our newsletter

New Things Will Always Update Regularly