Associate Security Analyst
Role details
Job location
Tech stack
Job description
The primary purpose of the Associate Security Analyst role within the Security Operations Centre (SOC) is to safeguard the company's information systems and data by detecting, responding to and investigating security threats. As part of the SecOps function, the Security Analyst works on a shift roster to ensure continuous coverage and vigilance. The role involves performing daily, weekly and ad-hoc security checks as part of process, maintaining situational awareness, and acting as the first line of defence against cyber threats. The Security Analyst collaborates with various teams to enhance security measures, maintain compliance with industry standards, and contribute to the overall security posture of iPipeline.
- Incident Response & Investigation
- Act as a frontline responder, performing initial triage, evidence gathering, and early analysis of security incidents following SOC procedures.
- Manage incidents appropriate to the Associate level-coordinating actions, documenting progress, and communicating updates-while escalating higher-risk events to senior analysts.
- Apply critical thinking to validate alerts, assess impact, and recommend containment steps under supervision.
- Support incident reporting, root-cause analysis, and post-incident reviews to contribute to SOC improvements.
- Core Monitoring & Detection
- Monitor security events and alerts across multiple technologies (e.g., SIEM, EDR, AV/Anti-malware, IDP) and perform basic queries to analyse potential threats.
- Conduct routine daily, weekly, and ad-hoc security checks to maintain situational awareness and identify anomalies.
- Follow established SOPs, battle cards, and predefined detection playbooks to triage alerts and determine next steps.
- Threat Intelligence & Vulnerability Awareness
- Maintain awareness of common security threats, threat actors, and vulnerabilities affecting operating systems, applications, and cloud services (AWS).
- Assist with reviewing vulnerability and misconfiguration results and basic prioritisation of findings
- Tooling & Services Ownership
- Take functional ownership of assigned security tools or services, ensuring they operate correctly and follow established processes.
- Support the continuous maturation of security tooling-fine-tuning detections, validating alerts, and identifying opportunities for improvement.
- Perform basic configuration checks or data validation within ticketing, asset, or monitoring systems.
Requirements
Do you have experience in TCP/IP?, Do you have a Bachelor's degree?, * Basic Threat Detection: Ability to identify and report common security events.
- Network Fundamentals: Understanding of TCP/IP, firewalls, and basic network security concepts.
- Incident Documentation: Ability to maintain accurate records of incidents and actions taken.
- SIEM Tools: Familiarity with security tools for monitoring (e.g., CrowdStrike - Various Modules, Guard Duty, Security Hub).
- Basic knowledge of cybersecurity concepts and tools.
Fringe Benefits:
- Typically requires a bachelor's degree in Information Security, Computer Science, or a related field (or international equivalent).
- Typically requires 0 - 2 years of experience in security monitoring or IT helpdesk experience.