Security Analyst
Role details
Job location
Tech stack
Job description
Teradata is seeking a Security Operations Analyst to join our Security Operations Center (SOC). This role combines hands-on technical work with a focus on threat detection, incident response, and security monitoring using Microsoft security technologies. The ideal candidate is eager to grow their skills in automation and threat analysis while contributing to a collaborative, high-performing security team., * Develop and maintain detection rules and alerts in Microsoft Sentinel to identify security threats and incidents.
- Assist in the tuning and optimization of existing alerts to reduce false positives while maintaining detection effectiveness.
- Support the creation and upkeep of playbooks for incident response and security orchestration.
- Contribute to automation initiatives that streamline SOC operations and improve response times.
- Investigate and respond to security incidents, escalating complex cases to senior analysts as needed.
- Participate in threat hunting activities using Microsoft Sentinel and Defender to identify potential compromises.
- Utilize Microsoft Defender for Endpoint (EDR) for endpoint threat detection, investigation, and response.
- Analyze security telemetry and logs to identify trends, anomalies, and potential security gaps.
- Document security procedures, playbooks, and detection logic for knowledge sharing and compliance purposes.
- Stay current with emerging threats, attack techniques, and Microsoft security platform updates.
Who You'll Work With
You will collaborate with Azure infrastructure teams and senior SOC analysts to implement security best practices and support defense-in-depth strategies.
Requirements
- Solid working knowledge of Microsoft Sentinel including KQL (Kusto Query Language), analytics rules, and workbooks.
- Proficiency with Microsoft Defender for Endpoint including threat detection, investigation workflows, and advanced hunting.
- Foundational understanding of Azure platform concepts including Azure AD/Entra ID, Azure Security Center, and identity protection.
- 2-3+ years of experience in security operations, incident response, or a related cybersecurity role.
- Experience working with detection rules and playbooks in a SIEM environment.
- Working knowledge of threat actor tactics, techniques, and procedures (TTPs) and frameworks such as MITRE ATT&CK.
- Familiarity with scripting or automation languages such as PowerShell or Python.
- Ability to manage multiple tasks effectively and perform well under pressure.
What You'll Bring
- Good communication skills with the ability to document and convey technical findings clearly.
Benefits & conditions
Pay Rate: 84,000.00 - 105,000.00 - 126,000.00 Annually
Starting pay for the successful applicant will depend on geographic location, internal equity, job-related knowledge, skills, and candidate experience. Sales roles will be eligible for commission payments tied to quota achievement. All other permanent roles will be eligible for one of our annual incentive plans, which are based on company financial attainment and individual performance.
Employees in this position are also eligible to participate in the Company's comprehensive benefits programs, which include healthcare, life and disability insurance plans, a 401(k)-retirement savings plan, and time-off programs. Specific details of these benefits, including eligibility criteria and plan options, will be provided during the hiring process and can be reviewed here: https://www.teradata.com/About-Us/Careers/Benefits