Security Analyst I

Job Summary

The Security Analyst role is responsible for performing accurate and precise real-time analysis and correlation of logs/alerts from a multitude of client devices with a focus on the determination of whether said events constitute security incidents.


Primary Responsibilities

  • Perform daily expert review of customer logs  
  • Provide technical support for multiple Alert Logic customers by analyzing and reviewing logs or functional events within our customers’ network systems and reporting on any abnormalities to security or operational customer contacts  
  • Escalate high priority technical or security related issues by communicating your analysis to our customers in a timely fashion in accordance with customer specifications  
  • Professional, polite, and accurate communication with customers and coworkers.  
  • Prepare for and conduct new service orientations  

Required Skills and Experience

  • Basic command of Linux systems administration and working with BASH
  • Basic hands on experience working with Windows infrastructure
  • Basic experience in one of Linux, Windows or Database administration
  • Basic hands on experience configuring Windows or Linux system logging
  • Basic understanding of Windows or Linux logging / auditing capabilities
  • Basic understanding of networking including TCP/IP
  • Basic understanding of cloud environment and infrastructure (AWS, Azure, Google Cloud, etc.)
  • Strong time management skills with the ability to multitask
  • Ability to work a flexible schedule including weekends and evenings, and night shifts
  • Detail oriented individuals that work well in a team environment and have a hunger to learn
  • Analytical and problem solving skills
  • Demonstrable verbal and written communication experience
  • Experience using Microsoft Word, Excel, PowerPoint

Desired Skills and Experience

  • Basic possession of a diverse log message and windows event vocabulary
  • Basic understanding of the Top 20 Critical Security Controls for Effective Cyber Defense
  • Basic understanding of Security Information & Event Management (SIEM) concepts and functionality
  • Basic experience with vulnerability scanning and reconnaissance methods
  • Basic understanding the 6 phases of Incident Handling (Preparation, Identification, Containment, Mitigation, Remediation and Lessons Learned)
  • At least one security certification such as SANS, EC-Council, or ISC2
  • Basic knowledge of threat vectors against the Windows or Linux platform
  • Basic experience with ticketing systems, to include understanding work flow, ticket routing and resolution documentation
  • Operations Experience (SOC Operations an advantage)
  • Experience working in customer service oriented organization


  • Bachelor’s degree in Computer Science, Computer Engineering, Network Security, Information Security, Information Technology or equivalent work experience.  1-3 years of work experience in the field.



Leave a Reply