CSOC Analyst
Role details
Job location
Tech stack
Job description
Fastly is seeking a CSOC Analyst to join our dedicated Customer Security Operations Centre. In this role, you will be a frontline defender for Fastly's global enterprise customers. You will leverage our edge cloud platform and an array of security products in monitoring traffic, detect sophisticated anomalies, and deploy real-time mitigations against DDoS, Bot, and Web Application attacks.
This is a high-impact role where you act as a strategic partner for our Managed Security Service (MSS) clients, providing the expert visibility and rapid response necessary to address internet-scale threats.
What you'll Do:
- Active Incident Response: Lead the identification and mitigation of high-impact security events. You will analyze sophisticated traffic patterns and implement precise countermeasures, including rate limiting and custom WAF & Security rules to neutralize threats in real-time.
- Managed Security Delivery: Serve as a primary security consultant for MSS Customers. This involves continuous tuning and refining of security policies to optimize detection accuracy and maintaining a hardened security posture tailored to each client's unique environment.
- Advanced Threat Hunting: Conduct data-driven investigations using log analysis to uncover potential threats and hardenings opportunities
- Security Intelligence & Reporting: Author comprehensive After Action Reports (AARs) and monthly security summaries. You will translate complex telemetry and attack data into high-level actionable insights for customer stakeholders.
- Strategic Communication: Act as the Subject Matter Expert (SME) during active security incidents. You will provide clear, calm, and professional guidance via real-time communication channels, ensuring customers are informed and confident in our defensive strategy.
Requirements
- Protocol Proficiency: Deep technical knowledge of the internet stack, specifically HTTP/S, TCP/IP, DNS, and TLS. You should be comfortable analyzing handshake processes, header structures, and status codes.
- Analytical Rigor: A methodical approach to digital forensics and incident response. You possess the ability to correlate disparate data points within JSON or CSV logs to reconstruct an attack narrative.
- Communication Excellence: The ability to distill complex technical findings into concise, professional, and empathetic communications for both technical and non-technical audiences.
We'll be super impressed if you have experience in any of these:
- Proficiency in Python or Bash for log parsing and workflow automation.
- Experience with Infrastructure as Code/Security as Code(SaC) (Terraform) or edge-based configurations.
- Industry-standard certifications such as CompTIA CySA+, GCIH, or Security+.
Work Hours: This position will require you to be available during core business hours 9am - 6pm
Work Location(s) & Travel Requirements: This position is a hybrid role (twice a week in office) and open to candidates residing in the following location: London