Security Analyst
Role details
Job location
Tech stack
Job description
As a Security Analyst on the Figment Security Team, you will be on the front lines of protecting our cutting-edge blockchain infrastructure. This is not a traditional SOC role. You will operate in a modern, code-driven environment where your primary mission is to engineer high-fidelity detections, triage security alerts, analyze logs, respond to incidents, and continuously improve our security posture.
You will be a key player in our "security-as-code" culture, using Python to write detections utilizing your knowledge of security of operating systems, networking and protocols, firewalls, databases and cloud platforms. Beyond technical execution, you will be a trusted security educator, researching the latest tactics, threats, and procedures (TTPs) across the industry and sharing that knowledge to uplift the entire organization.
How you will make an impact
- Detection Engineering : Design, build, and tune real-time detections in Python, focusing on threats to our cloud-native services, SaaS applications, and blockchain infrastructure.
- Incident Response & Analysis : Act as the primary responder for escalated security incidents. Analyze alerts to conduct in-depth log analysis and perform investigations to determine scope, impact, and root cause.
- Threat Hunting : Proactively hunt for undetected malicious activity and emerging threats using available security tooling and custom queries.
- Automation & Tooling : Develop scripts and tools to automate security workflows, data enrichment, and repetitive security tasks. Our environment is built on code-you will contribute directly to it.
- Security Education : Research and analyze emerging threats in the blockchain and Web3 space. Communicate your findings clearly to both technical and non-technical audiences to strengthen our company-wide security awareness.
- Protect Critical Assets : Collaborate with engineering teams to develop and refine security strategies for protecting high-risk, internet-facing blockchain infrastructure.
- Develop Runbooks : Create detailed processes, procedures, and workflows to support Blue Team operations and response activities.
Requirements
-
3+ years of hands-on experience in a security operations, detection engineering, or incident response role, preferably within a cloud-first environment.
-
Proficiency in Python , specifically for data analysis, automation, and writing security detections. You must be comfortable writing and maintaining Python code.
-
Hands-on experience with a SIEM platform (e.g., Panther, Splunk, Sumo Logic). Direct experience analyzing logs from cloud and SaaS applications is essential.
-
Demonstrable experience securing AWS environments and a strong understanding of core services (e.g., EC2, S3, IAM, CloudTrail, VPC).
-
A "security-as-code" mindset with practical experience using tools like Terraform and Git / GitHub for managing infrastructure and configurations.
-
Excellent communication skills , with the ability to distill complex technical topics for a broader audience. Even better if you have :
-
Working knowledge of Terraform, Ansible, AWS, Azure, GCP. Kubernetes and Git.
-
A deep passion for and knowledge of security risks unique to Web3, blockchain protocols, smart contracts, and staking infrastructure .
-
Relevant industry certifications such as GIAC (GCIH, GCFA, GCDA), AWS Security Specialty, Blue Team Level 1 / 2, or equivalent hands-on experience.
-
Contributions to open-source security projects or a public GitHub profile showcasing your work. Technologies we use Python, SentinelOne, Panther SIEM, Wiz, Github, Terraform Teams you'll collaborate with most often In addition to collaborating with other Security team members, this role will collaborate most often with our Engineering teams.