Security Operations Analyst
Listed on 2026-02-28
-
IT/Tech
Cybersecurity, Security Manager
Overview
Atlanta, Georgia;
Austin, Texas;
Boston, Massachusetts;
Denver, Colorado
Iterable is the leading AI-powered customer engagement platform that helps brands create dynamic, individualized experiences platform activates customer data, designs cross-channel interactions, and optimizes engagement with enterprise-grade security and compliance. Today, nearly 1,200 brands across 50+ countries rely on Iterable to drive growth, deepen customer relationships, and deliver joyful customer experiences.
With a global presence—including offices in San Francisco, New York, Denver, London, and Lisbon, plus remote employees worldwide—we are committed to building a diverse and inclusive workplace. We welcome candidates from all backgrounds and encourage you to apply.
Learn more about our story and mission on our Culture and About Us pages. Let’s shape the future of customer engagement together!
How you will make an impactWe are seeking a detail-oriented and process-driven Security Operations Analyst to join our Security Engineering team. This role is best suited for a Junior-level individual with some experience who is looking to transition into a Mid-level security operational role. The ideal candidate is ready to become a critical part of maintaining our daily security posture through consistent operational execution, including alert triage, incident coordination, vulnerability and threat monitoring, and validation of detection coverage.
This is a hands-on security operations role and the primary operational resource supporting our Security Engineering team. Success hinges on a disciplined approach to daily execution, making this the perfect role for a process-driven individual eager to master foundational security operations and make a measurable impact on our security posture. The role requires exceptional attention to detail, comfort with repetitive workflows, and a strict adherence to runbooks and standard operating procedures (SOPs).
Candidates who are disciplined, reliable, and motivated by foundational security operations should apply. The willingness to learn new concepts and clearly convey them to stakeholders is required and encouraged, as is staying open to different methods of achieving goals.
Alert & Incident Operations
- Alert Triage & Queue Management:
Investigate, enrich data, and escalate alerts and tickets generated by the SIEM, SOAR, EDR, IDS, and other monitoring tools. - Case Escalation:
Identify alerts and situations requiring escalation to the Security on-call. - Incident Coordination:
Maintain accurate incident records in security incident tracking systems, including ownership, timeline tracking, status updates, and retrospective remediation tasks. - Coordinate communications for containment and remediation steps with engineering, security, support, and other teams.
- Conduct detection validation, verify false positives, and add research for alerts to tickets before escalation to senior security engineers.
- Case Documentation:
Ensure investigation notes, follow-ups, retrospective analysis, and action items are documented and tracked to completion. - Perform unsupervised investigation for lower-severity incidents or exploratory cases to determine significance.
- Stay up-to-date with trending cybersecurity topics and their enterprise applications.
- Follow escalation protocols across the Security Engineering team and provide evidence for changes as needed.
- Understand detections, threat hunting, and threat intelligence roles within a security program.
- Bridge between Security Operations and Engineering by translating threat research into actionable deliverables with guidance from senior team members.
- Provide concise feedback on detections and identify areas for improvement in the operational workload.
Vulnerability & Exposure Management
- Perform vulnerability triage, enrichment, prioritization guidance, and escalation of actionable issues.
- Investigate and validate vulnerabilities, leaked secrets, and suspicious activity surfaced through scanning tools.
- Support Security Risk Register entries, including evidence collection and validation.
- Maintain tooling hygiene, run test scans, verify…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).