Security Analyst

CyeraSt. Louis, MO
20dRemote

About The Position

Come join the company reinventing data security, empowering businesses to realize the full potential of their data. As the leading data security platform purpose-built for the cloud era, Cyera’s mission is to reinvent how businesses secure data, enable agile collaboration, and boldly pursue new business opportunities. Trusted by security teams at leading global businesses, our team is proving that data security is the next big thing in cyber. Backed by the world’s leading investors and working with a large and growing list of Fortune 1000 companies, we are looking for world-class talent to join us as we usher in the new era of data security. The Security Analyst plays a key role in protecting our organization by detecting, investigating, and responding to security incidents across our environment. This individual will operate on the front lines of our Security Operations Center (SOC), leveraging a variety of tools and intelligence sources to identify threats, contain issues, and continuously improve our defenses. The ideal candidate is detail-oriented, proactive, and eager to deepen their technical expertise in a fast-paced, collaborative security team.

Requirements

  • 2–4 years of experience in security operations, incident response, or threat detection.
  • Familiarity with SIEM, EDR, and related security tools (e.g., Splunk, Sentinel, CrowdStrike, etc.).
  • Understanding of IAM, cloud platforms (AWS, GCP, Azure), and basic network security principles.
  • Strong analytical and problem-solving skills, with attention to detail and documentation.
  • Excellent communication and teamwork skills.

Responsibilities

  • Triage incoming security alerts and requests, ensuring timely communication and resolution in coordination with internal stakeholders.
  • Conduct first-line investigations using data from SIEM queries, IAM logs, and endpoint/cloud telemetry.
  • Execute approved containment and remediation actions (e.g., disabling user accounts, revoking tokens, quarantining assets).
  • Collaborate closely with IT, Security Engineering, and MSSP partners to escalate and resolve complex incidents.
  • Document investigation steps, outcomes, and lessons learned for future reference and process improvement.
  • Utilize security tools such as SIEM, DLP, EDR, and DSPM platforms to validate alerts, uncover misconfigurations, and identify potential threats.
  • Tune detection rules and contribute to continuous improvement of alert quality, reducing false positives.
  • Monitor threat intelligence feeds to identify new vulnerabilities and recommend practical mitigation strategies.
  • Partner with engineering teams to enhance visibility and strengthen detection coverage across systems and environments.
  • Draft, maintain, and refine SOPs and runbooks for recurring alerts and incident types.
  • Help define alert severity levels, SLAs, and escalation paths; identify opportunities for automation and workflow optimization.
  • Build lightweight dashboards and KPIs (e.g., alert volume, false positive rate, SLA attainment) to provide actionable insights to leadership.

Benefits

  • Ability to work remotely, with office setup reimbursement
  • Competitive salary
  • Unlimited PTO
  • Paid holidays and sick time
  • Health, vision, and dental insurance
  • Life, short and long-term disability insurance

Stand Out From the Crowd

Upload your resume and get instant feedback on how well it matches this job.

Upload and Match Resume

What This Job Offers

Job Type

Full-time

Career Level

Mid Level

Education Level

No Education Listed

Number of Employees

501-1,000 employees

© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service