We are seeking a highly motivated and skilled intelligence analyst with hands-on Python programming experience to join our Operation Security (OpSec) team. This role focuses on monitoring, analyzing, and automating the processing of intelligence-related data from multiple sources to ensure the stability, performance, and security of operations.
The ideal candidate has a strong background in cybersecurity monitoring combined with the ability to develop Python-based automations and analytical workflows to detect, investigate, and prevent security threats.
Key Responsibilities
Provide timely response to Operational Security (OpSec) incidents, triage alerts, and categorize issues for escalation to appropriate technical teams.
Monitor and analyze security data from multiple sources, including network logs, system logs, performance metrics, and customer reports.
Develop and maintain Python-based scripts and automations to:
Parse, normalize, and analyze large volumes of log and security data
Automate alert triage, reporting, and repetitive SOC workflows
Improve detection efficiency and response times
Communicate effectively with internal teams and customers to provide incident status updates and resolution details.
The ideal candidate has a strong background in cybersecurity monitoring combined with the ability to develop Python-based automations and analytical workflows to detect, investigate, and prevent security threats.
Key Responsibilities
Provide timely response to Operational Security (OpSec) incidents, triage alerts, and categorize issues for escalation to appropriate technical teams.
Monitor and analyze security data from multiple sources, including network logs, system logs, performance metrics, and customer reports.
Develop and maintain Python-based scripts and automations to:
Parse, normalize, and analyze large volumes of log and security data
Automate alert triage, reporting, and repetitive SOC workflows
Improve detection efficiency and response times
Communicate effectively with internal teams and customers to provide incident status updates and resolution details.
Requirements:
Experience working with network and system logs, security events, and performance metrics.
Ability to combine and analyze multiple datasets to identify security patterns and trends.
Experience with network monitoring and troubleshooting tools.
Hands-on experience with network sniffing tools.
Proficiency in Excel for data analysis and reporting.
Background in intelligence operations or intelligence analysis.
Strong Python programming skills, with experience in:
Data analysis (e.g., parsing logs, statistical analysis, trend detection)
Automation of monitoring, alerting, and reporting workflows
Education
Bachelors degree in Computer Science, Information Technology, Cybersecurity, or a related field or equivalent hands-on experience in intelligence operations, automation, or security analysis.
Experience working with network and system logs, security events, and performance metrics.
Ability to combine and analyze multiple datasets to identify security patterns and trends.
Experience with network monitoring and troubleshooting tools.
Hands-on experience with network sniffing tools.
Proficiency in Excel for data analysis and reporting.
Background in intelligence operations or intelligence analysis.
Strong Python programming skills, with experience in:
Data analysis (e.g., parsing logs, statistical analysis, trend detection)
Automation of monitoring, alerting, and reporting workflows
Education
Bachelors degree in Computer Science, Information Technology, Cybersecurity, or a related field or equivalent hands-on experience in intelligence operations, automation, or security analysis.
This position is open to all candidates.















