Security Operations Analyst

Quanata
Summary
Join Quanata as a Security Operations Analyst and become a frontline defender in our Security Operations Center (SOC). Monitor alerts, investigate threats, and support our detection and response workflows. Collaborate with engineering, IT, and other security teams to triage incidents, assess risks, and drive operational improvements. This fast-paced role requires hands-on defense and continuous process improvement experience. You will investigate anomalous activity, track investigations, collaborate with other teams, support incident response, identify trends, improve SOC playbooks, participate in postmortems, support security evaluations, and contribute to threat-informed detection. The ideal candidate possesses strong analytical and problem-solving skills and is an effective communicator.
Requirements
- 3β5 years of experience in security operations, incident response, or a related technical support role
- Experience monitoring and responding to security incidents in both on-premises and cloud environments (e.g., AWS, GCP)
- Familiarity with SIEM, EDR, CSPM, DLP, identity logs, and incident response tools and workflows
- Experience with Jira-based triage workflows and structured investigation processes
- Strong understanding of security principles, threat landscapes, and common attack vectors
- Analytical thinker with strong problem-solving skills and a bias for operational improvement
- Effective communicator who can explain technical findings to both technical and non-technical audiences
- Proactive, organized, and adaptable in a fast-moving environment
Responsibilities
- Monitor and triage alerts using SIEM, endpoint, and cloud security platforms
- Investigate anomalous activity and escalate incidents according to defined runbooks
- Track investigations and incident status using Jira or other case management tools
- Collaborate with IT and engineering teams to validate and remediate alerts
- Support incident response, including containment and root cause analysis
- Identify trends in alert fatigue and contribute to tuning and detection improvements
- Maintain and improve SOC playbooks, runbooks, and detection documentation
- Participate in security incident postmortems and response exercises
- Support the security evaluation of third-party commercial products by triaging incoming requests or conducting technical reviews for suspicious behaviors, integration risks, and monitoring gaps prior to deployment
- Contribute to threat-informed detection development and SLA tracking for triage and response
Preferred Qualifications
- Experience tuning detection logic or scripting automation (SOAR or custom tooling)
- Familiarity with MITRE ATT&CK, NIST IR lifecycle, or CIS controls
- Security certifications such as OSCP, CCTH, CEH, AWS Security Specialty, or similar
- Understanding of regulatory frameworks (e.g., GDPR, CCPA, PCI-DSS) and their impact on security operations
Benefits
- Medical, dental, vision, life insurance and supplemental income plans for you and your dependents
- A Headspace app subscription
- Monthly wellness allowance
- A 401(k) Plan with a company match
- A one-time payment of $2K will be provided to cover the purchase of in-home office equipment and furniture at your discretion
- Our teams work with MacBook Pros, which we will deliver to you fully provisioned prior to your first day
- All employees accrue four weeks of PTO in their first year of employment
- New parents receive twelve weeks of fully paid parental leave which may be taken within one year after the birth and/or adoption of a child
- The twelve weeks is applicable to both birthing and non-birthing parent
- All employees receive up to $5000 each year for professional learning, continuing education and career development
- All team members also receive LinkedIn Learning subscriptions and access to multiple different coaching opportunities through BetterUp
Share this job:
Similar Remote Jobs

