Description

About the role

We are hiring a Security Analyst for the Internal Security team. Internal Security is a sub-team of the Information Security team in charge of the security of our internal systems and assets. The main responsibilities of the team include securing our assets by supporting asset and vulnerability management, providing technical expertise in malware and forensic analysis, data loss prevention, threat intelligence, detection engineering, maintaining and developing our internal security tooling and automations, and assisting the compliance team in passing audits. This is a position for you if you are a security professional with a knack for security event and data analysis, or an experienced data analyst/scientist looking to pivot into cybersecurity.

Main tasks and responsibilities:

Review logs across disparate systems to identify “low and slow” lateral movement or suspicious patterns that individual system alerts might miss.
Analyze behavior patterns for signs of credential theft, account hijacking, or disgruntled employee activity (e.g., bulk data downloads, off-hours access).
Perform deep-dive reviews of activity from “Admin” or “Superuser” accounts to ensure least-privilege compliance and detect privilege escalation.
Provide input to our detection engineering process by pointing out gaps in logs and missing detections.
Participate in our on-duty rotation (from 9:00 to 17:00 every workday) to handle detections and requests to the Internal Security team.

About you:

Professional experience with data analysis tools or SIEM tooling (proficiency in advanced query building capabilities in platforms like ELK or LogScale).
Strong problem-solving and analytical skills to assess threats, identify root causes, and suggest security improvements.
Ability to use Bash, Python, or another language to automate log parsing and data normalization.
Prior experience in a data science, data analysis role, forensic analysis or within the application security domain.
Experience in incident response, including log analysis and mitigation strategies.
Understanding of Identity & Access Management, including RBAC (Role-Based Access Control) and PAM (Privileged Access Management)

 

 

Are you interested in this position?

Apply by clicking on the “Apply Now” button below!
#JobsHubEstonia #GlobalRecrument
#CareerOpportunities #HiringNow
#JobSeekersNetwork #EstoniaJobs
#RecruitmentServices #EmploymentPortal