Scentbird

Security Analyst

Scentbird

full-time

Posted on:

Location Type: Remote

Location: United Kingdom

Visit company website

Explore more

AI Apply
Apply

About the role

  • Monitor security information and event management (SIEM) systems, endpoint detection and response (EDR) tools, cloud security posture management (CSPM), and other security telemetry sources for potential threats and anomalies
  • Perform initial triage, investigation, and containment of security incidents across on-premise, cloud (AWS), and SaaS environments
  • Conduct threat hunting across logs, network traffic, and endpoint data to identify hidden or emerging threats
  • Analyze malware samples, phishing campaigns, and attacker tactics, techniques, and procedures (TTPs) relevant to our industry
  • Assist in the development and tuning of detection rules, alerts, and automated response playbooks
  • Participate in vulnerability management processes including prioritization, validation, and tracking of remediation
  • Support compliance initiatives (SOC 2, PCI-DSS, GDPR/CCPA) through evidence collection, control monitoring, and audit preparation
  • Create clear, concise incident reports, executive summaries, and lessons learned documentation
  • Collaborate with IT, Engineering, DevOps, and Customer Support teams to implement security improvements and respond to incidents
  • Stay current on emerging threats, vulnerabilities, and defensive techniques relevant to subscription e-commerce businesses

Requirements

  • 3–5+ years of hands-on experience in a Security Operations Center (SOC), incident response, or security analyst role
  • Solid understanding of network protocols, operating systems (Windows & Linux), and cloud environments (AWS strongly preferred)
  • Practical experience with SIEM (Splunk, Elastic, Microsoft Sentinel, etc.), EDR (CrowdStrike, SentinelOne, Defender, etc.), and network security monitoring tools
  • Working knowledge of MITRE ATT&CK framework, common attack vectors, and indicators of compromise (IOCs)
  • Experience writing and/or tuning detection rules (Sigma, YARA, SPL, KQL, etc.)
  • Familiarity with incident response methodologies and tools (TheHive, MISP, Velociraptor, etc. is a plus)
  • Strong analytical and problem-solving skills with the ability to work independently on investigations
  • Bachelor’s degree in Cybersecurity, Computer Science, Information Technology, or equivalent practical experience
  • Ability to participate in an on-call rotation (currently 1 week per 2–3 months)
  • Nice to have: Relevant certifications (CompTIA Security+, CySA+, GCIH, GCIA, or equivalent)
  • Nice to have: Experience with AWS security services (GuardDuty, Security Hub, Inspector, CloudTrail)
  • Nice to have: Scripting skills (Python, PowerShell, Bash) for automation and analysis
  • Previous experience in e-commerce, subscription, or SaaS environments
Benefits
  • Competitive base compensation
  • Bonus program
  • Remote first *
  • Referral bonus
  • Paid Time Off and Wellness Time Off
  • Paid Parental Leave
  • 401k with Company Match through Fidelity
  • Medical, Dental, and Vision Benefits
  • Company provided Life insurance, Short-term & Long-term Disability
  • Flexible Spending Accounts, as well as Dependent Care Flexible Spending Accounts
  • Annual Education Stipend
  • Complimentary Scentbird Membership
  • Discounts on Owned Brands
  • Monthly virtual team building/ educational activities
  • A fun, creative and energetic work environment
Applicant Tracking System Keywords

Tip: use these terms in your resume and cover letter to boost ATS matches.

Hard Skills & Tools
security information and event management (SIEM)endpoint detection and response (EDR)cloud security posture management (CSPM)threat huntingmalware analysisdetection rulesvulnerability managementnetwork protocolsoperating systemsscripting
Soft Skills
analytical skillsproblem-solving skillsindependent workcollaboration
Certifications
CompTIA Security+CySA+GCIHGCIA