We are looking for an Incident Response Analyst to join our Security team and operate on the front line of protecting the company’s infrastructure and services.
Requirements
- 3+ years of experience in Incident Response or Security Operations
- Hands-on experience with SIEM platforms (Splunk, ELK/OpenSearch, Graylog, or similar)
- Ability to read and interpret logs: OS (Linux/Windows/macOS), network, applications, cloud
- Understanding of network protocols and traffic analysis (Wireshark, Zeek, etc.)
- Knowledge of attacker tactics and techniques (MITRE ATT&CK, kill chain, IOC/TTP)
- Ability to independently lead investigations from alert to final report
- Scripting skills for automation (Python / Bash)
- Basic understanding of integrating LLM-based tools
Benefits
- 25 vacation days and 5 family days yearly
- Flexible start to the workday
- Support from a professional corporate coach and psychologist
- Regular internal and external activities, workshops, trips, and corporate events
- Access to our internal knowledge base, meetups, and team-building activities
- Ongoing training in new technologies and continuous professional development support