Security Analyst

Consensys
Summary
Join Consensys as an Intermediate Security Analyst and actively monitor, investigate, and respond to security incidents across web2 and web3 environments. Leverage our security tooling ecosystem to detect and analyze threats. Apply incident response playbooks and suggest improvements. Conduct first and second-level investigations, utilizing our SOAR platform and machine learning detection systems. Help implement LLM integrations to enhance efficiency. Expand your expertise in blockchain security and contribute to threat intelligence. You will work on tools, infrastructure, and apps that scale platforms to onboard one billion participants and 5 million developers. Consensys offers a remote-friendly, start-up environment.
Requirements
- 2-4 years of experience in IT security, with SOC analyst experience
- Strong understanding of security principles, attack methodologies, and defense strategies
- Experience with SIEM platforms and security analytics
- Proficiency in using EDR and cloud security monitoring tools
- Ability to investigate and resolve common security incidents independently
- Knowledge of security compliance frameworks and requirements
- Experience documenting security incidents and creating technical reports
- Solid understanding of network protocols and common vulnerabilities
- Basic scripting abilities (Python, Bash, PowerShell) for security task automation
- Familiarity with threat intelligence concepts and practical application
- Strong analytical skills and attention to detail
- Excellent communication abilities and team collaboration skills
Responsibilities
- Monitor and investigate security alerts across traditional networks, blockchain networks, cloud platforms, and enterprise systems
- Perform first and second-level analysis of security incidents
- Apply and suggest improvements to incident response playbooks and procedures
- Document detailed findings from security investigations and maintain accurate incident records
- Utilize security tools including SIEM, EDR, cloud security systems, and blockchain-specific platforms
- Configure and tune security monitoring systems to reduce false positives
- Create and refine detection rules based on threat intelligence and observed patterns
- Support the implementation of SOAR workflows to automate response actions
- Use established machine learning models to improve threat detection effectiveness
- Help implement LLM integrations to enhance security operations efficiency
- Collaborate with other security teams to address vulnerabilities and security gaps
- Contribute to threat intelligence gathering and analysis
- Develop and maintain dashboards and reports for security metrics
- Write and maintain documentation for security procedures and common investigations
- Participate in on-call rotation for security incident response
- Mentor junior analysts on security tools and investigation techniques
Preferred Qualifications
- Security certifications (e.g., Security+, SSCP, CySA+, TryHackMe SOC Level 2 Path)
- Experience with blockchain technology or cryptocurrency security
- Knowledge of SOAR platforms and security automation
- Familiarity with machine learning applications in security
- Experience with cloud security architectures
- Knowledge of MITRE ATT&CK framework and its application
- Experience with digital forensics techniques and tools
- Understanding of security data analysis and visualization techniques
- Prior experience with incident response coordination
Benefits
US pay range (not including bonus, equity or other benefits) $155,000 β $186,000 USD