Information Security Analyst

Kinaxis Inc.
Hybrid

About The Position

The Information Security Analyst (Eastern Time Zone) is a cybersecurity professional responsible for supporting day‑to‑day security monitoring, incident triage, investigation support, and operational tasks across Corporate IT environments and the Kinaxis Maestro SaaS platform. In this role, you will be part of Kinaxis’s global follow-the-sun incident response framework, and serve as the first responder for the Eastern time zone, providing continuous monitoring and response by performing initial analysis of security alerts, escalating confirmed or suspected incidents, and assisting with investigations under led by senior analysts. This position is designed to build foundational security operations capabilities through hands‑on experience, structured processes, and close collaboration with experienced team members. You will work closely with team members across IT, SaaS Operations, Product Development, and Business Systems teams while developing technical depth, analytical judgment, and confidence in real-world security operations.

Requirements

  • Bachelor’s degree in Information Security, Computer Science, Information Technology, or a related field or equivalent hands‑on experience, internships, or co‑op placements.
  • 3–5 years of experience in cybersecurity, IT operations, SOC, or related technical roles.
  • Basic understanding of cybersecurity concepts such as malware, phishing, authentication, and network security.
  • Strong analytical and problem‑solving skills, with attention to detail.
  • Clear written and verbal communication skills.
  • Ability to follow procedures, accept feedback, and work effectively as part of a global team.
  • Comfortable working in a shift‑based or follow‑the‑sun operational model
  • Certifications:Desiredo CompTIA Security+ , CompTIA CySA+o Microsoft Security Fundamentalso Cloud fundamentals (Azure, AWS, or GCP)

Nice To Haves

  • CISSP, CCSP, GIAC (GCIH, GCIA, GCED, GCFA) or equivalent Role Specific Skills and Experience
  • Exposure to SIEM or security monitoring tools (e.g., Microsoft Sentinel, Splunk, or similar).
  • Basic understanding of incident response processes and alert triage.
  • Familiarity with common attack techniques and indicators.
  • Experience following established playbooks and runbooks during security events.
  • Introductory knowledge of cloud platforms and SaaS environments.
  • Awareness of security technologies such as firewalls, EDR, IAM, and logging systems.
  • Knowledge of industry frameworks such as NIST CSF, ISO 27001, or SOC 2.
  • Knowledge of attacker TTPs, threat modeling, IOCs/IOAs, and MITRE ATT&CK.
  • Understanding of security technologies including firewalls, IDS/IPS, IAM, encryption, and authentication mechanisms.

Responsibilities

  • Monitor security alerts and events from SIEM, XDR/EDR, and other security tools.
  • Perform initial triage and analysis of alerts to determine severity, scope, and required escalation.
  • Escalate confirmed or suspicious activity to senior analysts in accordance with documented procedures.
  • Assist with containment, investigation, and recovery activities under supervision.
  • Accurately document findings, actions taken, and handoffs in incident tracking systems.
  • Support active incident response efforts by gathering evidence, collecting logs, and performing basic analysis.
  • Participate in incident reviews and post‑incident learning activities.
  • Participate in shift handovers to ensure continuity of monitoring and response across time zones Threat Detection & Analysis Support
  • Assist in reviewing and validating detection alerts aligned to known attacker techniques.
  • Learn and apply basic threat concepts, indicators of compromise (IOCs), and MITRE ATT&CK mappings.
  • Support threat hunting activities by executing predefined queries and analysis tasks.
  • Help identify gaps or false positives in existing detections and report findings to senior team members Security Tooling and Operations
  • Use and maintain familiarity with core security tools such as SIEM, EDR/XDR, and cloud security platforms.
  • Assist in updating operational playbooks, runbooks, and knowledge articles.
  • Support testing of new detections, tools, or automation under guidance.
  • Partner with IT and engineering teams to validate logging, monitoring, and alerting coverage.
  • Stay informed about common cyber threats, vulnerabilities, and security best practices.
  • Participate in training, tabletop exercises, and continuous improvement initiatives.
  • Demonstrate curiosity, accountability, and willingness to learn in a fast‑paced operational environment.

Benefits

  • Flexible vacation and Kinaxis Days (company-wide days off)
  • Flexible work options
  • Physical and mental well-being programs
  • Regularly scheduled virtual fitness classes
  • Mentorship programs, training, and career development
  • Recognition programs and referral rewards
  • Hackathons
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service