TL;DR
Security Analyst (Fintech): Managing the full lifecycle of security incidents across multiple domains, ensuring prompt prioritization and escalation of critical and high-severity threats. Focus on maintaining and enhancing detection rules within Splunk Cloud SIEM, collaborating for efficient incident response, and conducting continuous threat hunting and intelligence enrichment.
Location: Must be eligible to work remotely from Kazakhstan or onsite in Almaty/Astana (Kazakhstan) or Bengaluru (India). Working hours are 9 AM to 5:30 PM UK time.
Company
hirify.global is a dynamic fintech company specializing in retail finance solutions, helping consumers split payments over time with ease.
What you will do
- Monitor and triage security alerts, ensuring prompt prioritization and escalation of critical and high-severity threats.
- Engage in all stages of incident management: triaging, investigation, containing, remediation, and documenting security incidents.
- Maintain and enhance detection rules, automation workflows, and response playbooks within Splunk Cloud SIEM.
- Collaborate with internal SOC analysts, external MDR providers, and business teams to coordinate efficient incident response.
- Utilize EDR tools and email security platforms to proactively contain threats.
- Conduct continuous threat hunting and intelligence enrichment to stay ahead of evolving attack vectors.
Requirements
- Minimum 6 to 24 months of SOC experience with proven expertise in real-time security monitoring and incident response.
- Hands-on proficiency with Splunk Cloud SIEM for alert triage, rule tuning, and security data analytics.
- Operational experience with Endpoint Detection and Response and Email Security platforms.
- Familiarity with CASB/DLP solutions and vulnerability management.
- Knowledge of cloud security best practices and experience with Web Application Firewalls.
- Fluent written and spoken English with clear, effective communication and documentation skills.
- Commitment to a 24/7 on-call rotation (approximately one week every 4-5 weeks) with rapid response expectations.
Nice to have
- Bachelor’s degree in Cybersecurity, Computer Science, Information Technology, or equivalent.
- Experience with Splunk SPL language for automation and advanced queries.
- Experience with SentinelOne, Cylance, Mimecast, Netskope, Fastly WAF/CDN, Tenable, SOCRadar, KnowBe4 Phishing Alert Button, Jira, Slack/MS Teams, and PagerDuty.
- Experience developing and tuning SIEM detection rules and incident response playbooks.
- Familiarity with financial sector regulatory security requirements.
- Relevant certifications such as CompTIA Security+, SSCP, GIAC, CISSP, or equivalent.
Culture & Benefits
- Vacation and sick pay as per the laws of your country.
- Assistance with health insurance for you and your loved ones.
- Time off for state holidays according to the official calendar.
- Pleasant environment with corporate parties and get-togethers.
- Comfort service for technical and everyday work problems.
- Opportunity to work on global projects and grow your career in a supportive, flexible, and innovative tech environment.
- Help cover the cost of IT certifications and provide access to top-tier courses and learning platforms.
Будьте осторожны: если работодатель просит войти в их систему, используя iCloud/Google, прислать код/пароль, запустить код/ПО, не делайте этого - это мошенники. Обязательно жмите "Пожаловаться" или пишите в поддержку. Подробнее в гайде →