×
Register Here to Apply for Jobs or Post Jobs. X

Security Operations Analyst

Job in Austin, Travis County, Texas, 78716, USA
Listing for: Iterable
Full Time position
Listed on 2026-02-28
Job specializations:
  • IT/Tech
    Cybersecurity, Security Manager
Salary/Wage Range or Industry Benchmark: 60000 - 80000 USD Yearly USD 60000.00 80000.00 YEAR
Job Description & How to Apply Below

Overview

Atlanta, Georgia;
Austin, Texas;
Boston, Massachusetts;
Denver, Colorado

Iterable is the leading AI-powered customer engagement platform that helps brands create dynamic, individualized experiences  platform activates customer data, designs cross-channel interactions, and optimizes engagement with enterprise-grade security and compliance. Today, nearly 1,200 brands across 50+ countries rely on Iterable to drive growth, deepen customer relationships, and deliver joyful customer experiences.

With a global presence—including offices in San Francisco, New York, Denver, London, and Lisbon, plus remote employees worldwide—we are committed to building a diverse and inclusive workplace. We welcome candidates from all backgrounds and encourage you to apply.

Learn more about our story and mission on our Culture and About Us pages. Let’s shape the future of customer engagement together!

How you will make an impact

We are seeking a detail-oriented and process-driven Security Operations Analyst to join our Security Engineering team. This role is best suited for a Junior-level individual with some experience who is looking to transition into a Mid-level security operational role. The ideal candidate is ready to become a critical part of maintaining our daily security posture through consistent operational execution, including alert triage, incident coordination, vulnerability and threat monitoring, and validation of detection coverage.

This is a hands-on security operations role and the primary operational resource supporting our Security Engineering team. Success hinges on a disciplined approach to daily execution, making this the perfect role for a process-driven individual eager to master foundational security operations and make a measurable impact on our security posture. The role requires exceptional attention to detail, comfort with repetitive workflows, and a strict adherence to runbooks and standard operating procedures (SOPs).

Candidates who are disciplined, reliable, and motivated by foundational security operations should apply. The willingness to learn new concepts and clearly convey them to stakeholders is required and encouraged, as is staying open to different methods of achieving goals.

How You Will Make a Difference

Alert & Incident Operations

  • Alert Triage & Queue Management:
    Investigate, enrich data, and escalate alerts and tickets generated by the SIEM, SOAR, EDR, IDS, and other monitoring tools.
  • Case Escalation:
    Identify alerts and situations requiring escalation to the Security on-call.
  • Incident Coordination:
    Maintain accurate incident records in security incident tracking systems, including ownership, timeline tracking, status updates, and retrospective remediation tasks.
  • Coordinate communications for containment and remediation steps with engineering, security, support, and other teams.
  • Conduct detection validation, verify false positives, and add research for alerts to tickets before escalation to senior security engineers.
  • Case Documentation:
    Ensure investigation notes, follow-ups, retrospective analysis, and action items are documented and tracked to completion.
  • Perform unsupervised investigation for lower-severity incidents or exploratory cases to determine significance.
  • Stay up-to-date with trending cybersecurity topics and their enterprise applications.
  • Follow escalation protocols across the Security Engineering team and provide evidence for changes as needed.
  • Understand detections, threat hunting, and threat intelligence roles within a security program.
  • Bridge between Security Operations and Engineering by translating threat research into actionable deliverables with guidance from senior team members.
  • Provide concise feedback on detections and identify areas for improvement in the operational workload.

Vulnerability & Exposure Management

  • Perform vulnerability triage, enrichment, prioritization guidance, and escalation of actionable issues.
  • Investigate and validate vulnerabilities, leaked secrets, and suspicious activity surfaced through scanning tools.
  • Support Security Risk Register entries, including evidence collection and validation.
  • Maintain tooling hygiene, run test scans, verify…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary