Security Analyst
Posted 65ds ago
Employment Information
Report this job
Job expired or something wrong with this job?
Job Description
Security Analyst at Scentbird protecting sensitive customer data and responding to security incidents. Requires strong SOC experience and cloud security expertise for a rapidly evolving threat landscape.
Responsibilities:
- Monitor security information and event management (SIEM) systems, endpoint detection and response (EDR) tools, cloud security posture management (CSPM), and other security telemetry sources for potential threats and anomalies
- Perform initial triage, investigation, and containment of security incidents across on-premise, cloud (AWS), and SaaS environments
- Conduct threat hunting across logs, network traffic, and endpoint data to identify hidden or emerging threats
- Analyze malware samples, phishing campaigns, and attacker tactics, techniques, and procedures (TTPs) relevant to our industry
- Assist in the development and tuning of detection rules, alerts, and automated response playbooks
- Participate in vulnerability management processes including prioritization, validation, and tracking of remediation
- Support compliance initiatives (SOC 2, PCI-DSS, GDPR/CCPA) through evidence collection, control monitoring, and audit preparation
- Create clear, concise incident reports, executive summaries, and lessons learned documentation
- Collaborate with IT, Engineering, DevOps, and Customer Support teams to implement security improvements and respond to incidents
- Stay current on emerging threats, vulnerabilities, and defensive techniques relevant to subscription e-commerce businesses
Requirements:
- 3–5+ years of hands-on experience in a Security Operations Center (SOC), incident response, or security analyst role
- Solid understanding of network protocols, operating systems (Windows & Linux), and cloud environments (AWS strongly preferred)
- Practical experience with SIEM (Splunk, Elastic, Microsoft Sentinel, etc.), EDR (CrowdStrike, SentinelOne, Defender, etc.), and network security monitoring tools
- Working knowledge of MITRE ATT&CK framework, common attack vectors, and indicators of compromise (IOCs)
- Experience writing and/or tuning detection rules (Sigma, YARA, SPL, KQL, etc.)
- Familiarity with incident response methodologies and tools (TheHive, MISP, Velociraptor, etc. is a plus)
- Strong analytical and problem-solving skills with the ability to work independently on investigations
- Bachelor’s degree in Cybersecurity, Computer Science, Information Technology, or equivalent practical experience
- Ability to participate in an on-call rotation (currently 1 week per 2–3 months)
- Nice to have: Relevant certifications (CompTIA Security+, CySA+, GCIH, GCIA, or equivalent)
- Nice to have: Experience with AWS security services (GuardDuty, Security Hub, Inspector, CloudTrail)
- Nice to have: Scripting skills (Python, PowerShell, Bash) for automation and analysis
- Previous experience in e-commerce, subscription, or SaaS environments
Benefits:
- Competitive base compensation
- Bonus program
- Remote first *
- Referral bonus
- Paid Time Off and Wellness Time Off
- Paid Parental Leave
- 401k with Company Match through Fidelity
- Medical, Dental, and Vision Benefits
- Company provided Life insurance, Short-term & Long-term Disability
- Flexible Spending Accounts, as well as Dependent Care Flexible Spending Accounts
- Annual Education Stipend
- Complimentary Scentbird Membership
- Discounts on Owned Brands
- Monthly virtual team building/ educational activities
- A fun, creative and energetic work environment



















