Qureos

FIND_THE_RIGHTJOB.

Security Incident Response Analyst

JOB_REQUIREMENTS

Hires in

Not specified

Employment Type

Not specified

Company Location

Not specified

Salary

Not specified

Join us in bringing joy to customer experience. Five9 is a leading provider of cloud contact center software, bringing the power of cloud innovation to customers worldwide.

Living our values everyday results in our team-first culture and enables us to innovate, grow, and thrive while enjoying the journey together. We celebrate diversity and foster an inclusive environment, empowering our employees to be their authentic selves.

We are looking for an experienced Security Incident Response Analyst to join our Cyber Command Center team. This role includes hands-on involvement in incident response, detection engineering, and security automation. We value a candidate who is autonomous, responsible, and motivated. The right candidate will be comfortable pointing out weak points in our operation and implementing innovative changes that continuously improve our security posture.

Key Responsibilities:
  • Participate in and lead incident response efforts, from triage to remediation.
  • Develop and maintain detection rules, ensuring alerts are high-quality and actionable.
  • Perform detection tuning based on threat intelligence, use cases, and incident learnings.
  • Build and maintain SOAR playbooks to streamline and automate key workflows.
  • Contribute to the continuous improvement of SOC processes, tooling, and documentation.
Requirements:
  • 3 - 5 years specifically in incident response and security operations (SOC).
  • Strong analytical and problem-solving skills.
  • Excellent communication and reporting abilities (especially during incident escalation).
  • Ability to work under pressure and lead incident investigations.
  • Bachelor's degree in Computer Science, Information Security, Cybersecurity, or a related field.
  • Hands-on experience with modern SIEMs.
  • Experience working with SOAR platforms (e.g., writing and maintaining automation playbooks).
  • Background in security investigations.
  • Strong understanding of log sources, detection logic, and correlation techniques.
  • Familiarity with scripting or automation (e.g., Python, Bash).
Requirements:
  • Exposure to threat hunting and behavioral detection techniques.
  • Experience with cloud environments (GCP, AWS, or Azure).
  • Familiarity with EDR solutions and host-level investigation techniques.
  • Experience with hot/cold forensics techniques.
  • Experience with reverse engineering.
  • Background in enterprise-driven SaaS or customer experience is a plus.


Five9 embraces diversity and is committed to building a team that represents a variety of backgrounds, perspectives, and skills. The more inclusive we are, the better we are. Five9 is an equal opportunity employer.

View our privacy policy, including our privacy notice to California residents here: https://www.five9.com/pt-pt/legal.

Note: Five9 will never request that an applicant send money as a prerequisite for commencing employment with Five9.

© 2025 Qureos. All rights reserved.