Senior Security Operations Analyst
Gong View all jobs
- Dublin
- Permanent
- Full-time
- Be the Incident Commander: When the alarm bells ring, you're the calmest person in the room. You'll lead high-stakes response efforts from the first "ping" to the final "mission accomplished."
- Go Rogue (The Good Way): Forget waiting for alerts. You'll lead proactive hunting expeditions, sniffing out IoCs and behavioral anomalies before they ever make it to a headline.
- Build Your Robot Army: You have a healthy obsession with efficiency. You'll architect SOAR workflows and security automation to kill the manual grind, letting your team focus on the big-brain puzzles.
- Master the Multi-Cloud: AWS, GCP, Azure-you're the gatekeeper of our cloud kingdom, ensuring our posture is tighter than a drum across every environment.
- The Elite Mentor: You're the leader the pack looks to. You'll level up our junior analysts and set the gold standard during on-call rotations.
- The Cross-Functional Diplomat: You'll bridge the gap between IT, Legal, and Privacy, closing security gaps and making sure the entire org is as resilient as the tech they use.
- Total Autonomy: We don't micromanage; we empower. You see a gap? You fix it. You see a process to automate? You build it.
- Tech Stack Paradise: From EDR tuning to MDM strategy, you'll have your hands on the best tools in the business.
- 4+ years of experience in any of the following areas:
- Security Incident Response
- SIEM
- Cybersecurity threat detection, monitoring, and reporting
- Cyber Intelligence and Threat Hunting
- Vulnerability Management
- Proficiency with EDR/XDR (CrowdStrike, SentinelOne, MS Defender), Cloud Security Posture Management (Wiz, Prisma Cloud, Orca), and WAFs (Cloudflare, Akamai).
- Actively participated in Purple Team Exercises and Tabletop exercises, and applied necessary security controls
- Strong analytical and problem-solving skills.
- Excellent communication and teamwork abilities.
- Security certifications like Security+, GCIH, GCFE, GCFA, AWS Certified Cloud Practioner or similar are a plus.
- Familiarity with attack frameworks (MITRE ATT&CK) and mitigation strategies.
- Design and implement automated workflows using SOAR tools (e.g., Tines, Cortex XSOAR) to streamline repetitive tasks
- Scripting ability (PowerShell, Python) and familiarity with Query Languages (KQL, SQL, SPL) for automation needs.
- Experience leading deep-dive forensic analysis on cloud instances, containers (Kubernetes/Docker), and endpoints using tools like Volatility, Magnet, EnCase, or similar tools.
- Knowledge of global compliance frameworks like PCI-DSS, SOC 2, GDPR, and HITRUST.