Arbetsbeskrivning
Job Purpose
The Security Analyst works closely with the Security Operations Center (SOC), internal technical teams, and external security partners to detect, analyze, and respond to cybersecurity threats.
The role focuses on structured incident handling, email security monitoring, endpoint protection oversight, and continuous enhancement of the organization’s defensive capabilities.
Success requires strong analytical competencies, deep technical security knowledge, and effective coordination across multiple operational teams.
Key Responsibilities
- Collaborate with SOC analysts, security engineering teams, service owners, and email administration teams to ensure operational continuity, accurate information flow, and consistent knowledge transfer.
- Support the triage, investigation, and remediation of security alerts and incidents with a focus on email-based threats, malware detections, endpoint anomalies, and infrastructure-related security events.
- Contribute to the development and maintenance of SOC procedures, incident response playbooks, automated workflows, and technical documentation to standardize and optimize incident handling activities.
- Operate and interpret data from security monitoring and detection platforms including SIEM systems, EDR and antivirus technologies, email security gateways, and threat intelligence tools.
- Participate in security improvement initiatives, tool assessments, and cross-functional technical projects designed to enhance detection coverage, response capabilities, email protection controls, and endpoint defense mechanisms.
- Perform analysis of incident trends, threat activity patterns, email attack vectors, and SOC performance indicators to support operational reporting and continuous optimization.
- Collaborate with infrastructure, identity, cloud, application, and messaging teams to strengthen security posture, validate controls, and improve shared understanding of enterprise risk exposure.
Experience and Qualifications
- Bachelor’s degree in Information Security, Computer Science, or equivalent practical experience.
- Minimum of 3 to 5 years of experience in security operations, threat analysis, email security monitoring, or SOC environments.
- Strong understanding of security monitoring technologies, detection methodologies, and incident response processes, including hands-on experience with SIEM platforms, EDR and antivirus solutions, and email security technologies.
- Experience working with managed security service providers or external SOC partners is considered beneficial.
- Strong analytical, organizational, and coordination abilities with proven capability to manage multiple concurrent operational tasks.
- Excellent communication skills and demonstrated ability to work effectively within technical teams.
- Practical experience performing incident response, log analysis, malware investigation, email threat analysis, and operational security monitoring.
Note:
Assignment is at client's location in Githenburg.