
Security Analyst
Scentbird
full-time
Posted on:
Location Type: Remote
Location: United Kingdom
Visit company websiteExplore more
About the role
- Monitor security information and event management (SIEM) systems, endpoint detection and response (EDR) tools, cloud security posture management (CSPM), and other security telemetry sources for potential threats and anomalies
- Perform initial triage, investigation, and containment of security incidents across on-premise, cloud (AWS), and SaaS environments
- Conduct threat hunting across logs, network traffic, and endpoint data to identify hidden or emerging threats
- Analyze malware samples, phishing campaigns, and attacker tactics, techniques, and procedures (TTPs) relevant to our industry
- Assist in the development and tuning of detection rules, alerts, and automated response playbooks
- Participate in vulnerability management processes including prioritization, validation, and tracking of remediation
- Support compliance initiatives (SOC 2, PCI-DSS, GDPR/CCPA) through evidence collection, control monitoring, and audit preparation
- Create clear, concise incident reports, executive summaries, and lessons learned documentation
- Collaborate with IT, Engineering, DevOps, and Customer Support teams to implement security improvements and respond to incidents
- Stay current on emerging threats, vulnerabilities, and defensive techniques relevant to subscription e-commerce businesses
Requirements
- 3–5+ years of hands-on experience in a Security Operations Center (SOC), incident response, or security analyst role
- Solid understanding of network protocols, operating systems (Windows & Linux), and cloud environments (AWS strongly preferred)
- Practical experience with SIEM (Splunk, Elastic, Microsoft Sentinel, etc.), EDR (CrowdStrike, SentinelOne, Defender, etc.), and network security monitoring tools
- Working knowledge of MITRE ATT&CK framework, common attack vectors, and indicators of compromise (IOCs)
- Experience writing and/or tuning detection rules (Sigma, YARA, SPL, KQL, etc.)
- Familiarity with incident response methodologies and tools (TheHive, MISP, Velociraptor, etc. is a plus)
- Strong analytical and problem-solving skills with the ability to work independently on investigations
- Bachelor’s degree in Cybersecurity, Computer Science, Information Technology, or equivalent practical experience
- Ability to participate in an on-call rotation (currently 1 week per 2–3 months)
- Nice to have: Relevant certifications (CompTIA Security+, CySA+, GCIH, GCIA, or equivalent)
- Nice to have: Experience with AWS security services (GuardDuty, Security Hub, Inspector, CloudTrail)
- Nice to have: Scripting skills (Python, PowerShell, Bash) for automation and analysis
- Previous experience in e-commerce, subscription, or SaaS environments
Benefits
- Competitive base compensation
- Bonus program
- Remote first *
- Referral bonus
- Paid Time Off and Wellness Time Off
- Paid Parental Leave
- 401k with Company Match through Fidelity
- Medical, Dental, and Vision Benefits
- Company provided Life insurance, Short-term & Long-term Disability
- Flexible Spending Accounts, as well as Dependent Care Flexible Spending Accounts
- Annual Education Stipend
- Complimentary Scentbird Membership
- Discounts on Owned Brands
- Monthly virtual team building/ educational activities
- A fun, creative and energetic work environment
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard Skills & Tools
security information and event management (SIEM)endpoint detection and response (EDR)cloud security posture management (CSPM)threat huntingmalware analysisdetection rulesvulnerability managementnetwork protocolsoperating systemsscripting
Soft Skills
analytical skillsproblem-solving skillsindependent workcollaboration
Certifications
CompTIA Security+CySA+GCIHGCIA