كلما زادت طلبات التقديم التي ترسلينها، زادت فرصك في الحصول على وظيفة!

إليك لمحة عن معدل نشاط الباحثات عن عمل خلال الشهر الماضي:

عدد الفرص التي تم تصفحها

عدد الطلبات التي تم تقديمها

استمري في التصفح والتقديم لزيادة فرصك في الحصول على وظيفة!

هل تبحثين عن جهات توظيف لها سجل مثبت في دعم وتمكين النساء؟

اضغطي هنا لاكتشاف الفرص المتاحة الآن!
نُقدّر رأيكِ

ندعوكِ للمشاركة في استطلاع مصمّم لمساعدة الباحثين على فهم أفضل الطرق لربط الباحثات عن عمل بالوظائف التي يبحثن عنها.

هل ترغبين في المشاركة؟

في حال تم اختياركِ، سنتواصل معكِ عبر البريد الإلكتروني لتزويدكِ بالتفاصيل والتعليمات الخاصة بالمشاركة.

ستحصلين على مبلغ 7 دولارات مقابل إجابتك على الاستطلاع.


تم إلغاء حظر المستخدم بنجاح
https://bayt.page.link/FbtMVxZPdmCwdPzE8
العودة إلى نتائج البحث‎

Sr. Security Operations Analyst

في الامس 2026/09/11
خدمات الدعم التجاري الأخرى
أنشئ تنبيهًا وظيفيًا لوظائف مشابهة
تم إيقاف هذا التنبيه الوظيفي. لن تصلك إشعارات لهذا البحث بعد الآن.

الوصف الوظيفي

Meet the Moment with Alteryx




We're living through a once-in-a-generation shift in how work gets done. Data, automation, and AI are quickly becoming the center of every business decision - and Alteryx is leading the transformation.




You'll be working on the challenges that sit at the heart of modern business. No matter your role, the work you do will help organizations move faster, see more clearly, and tackle questions that used to feel impossible.




If you're ready to meet the moment with innovation, curiosity, and excellence, there's a place for you here.





Position Overview
As a member of the Security Operations team, you will be on the front line of protecting Alteryx products, infrastructure, and applications. You will triage and investigate alerts, lead incident response activities, and improve detection coverage and response outcomes across endpoint, identity, SaaS, and multi-cloud environments (AWS, Azure, GCP). This role is SOC-focused and is intended for a Senior level analyst with demonstrated depth in one or more of the following areas: Forensics, Cloud Security Investigations (AWS/Azure/GCP audit logs and cloud-native security signals), Threat Hunting, and Detection Engineering.

Primary Responsibilities
·      Triage and respond to security alerts and incidents across on-prem and multi-cloud enterprise and product environments, leading in-depth investigations using SIEM, EDR, cloud audit logs, identity telemetry, and network data to determine scope, root cause, attacker TTPs, and business impact.
·      Lead incident communications (severity updates, stakeholder coordination, executive-ready summaries as needed)
·      Execute incident response activities through containment and remediation coordination with partner teams (IT, Cloud/Platform, Engineering), including clear escalation when needed.
·      Produce high-quality incident documentation (timelines, evidence collected, hypotheses tested, IOCs, actions taken, lessons learned) and ensure follow-ups are tracked to completion.
·      Conduct hypothesis-driven threat hunts mapped to common adversary behaviors (e.g., MITRE ATT&CK).
·      Translate hunt findings into actionable improvements: new detections, tuning, playbooks, and telemetry/visibility recommendations.
·      Develop, tune, and maintain detection content (correlation rules, SIEM analytics, alert logic) to improve coverage and reduce false positives.
·      Validate detections with testing and retrospective analysis; continuously improve alert fidelity and response workflows.
·      Collaborate with stakeholders to define and maintain monitoring and detection use cases that drive risk reduction and operational effectiveness.
·      Perform basic endpoints and/or cloud forensics during escalated incidents and preserve evidence appropriately.
·      Support malware triage and artifact analysis as needed during investigations.
·      Investigate cloud-related threats and anomalies using cloud-native security signals and audit telemetry (AWS/Azure/GCP).
·      Partner with Cloud/Platform teams to close investigation gaps (logging, retention, telemetry coverage) and validate remediation actions.
·      Participate in an on-call rotation to provide 24x7 incident response coverage and serve as an escalation point for high-severity events.
Required Qualifications
·       Bachelor’s degree in computer science or related field (or equivalent experience/training). A master’s degree is a plus.
·       4+ years of relevant security operations / incident response experience
·       Strong understanding of the security incident management lifecycle and operational response practices.
·       Strong experience with SIEM/log management platforms (e.g., Microsoft Sentinel, Splunk, ELK, Snowflake-based analytics, or similar) and demonstrated ability to query and analyze telemetry.
·       Ability to analyze and interpret security-relevant data including security event logs, system logs, application logs, cloud audit logs, and device logs.
·       Hands-on investigation experience using cloud-native security services (e.g., AWS Security Hub, Microsoft Defender for Cloud, Google Security Command Center) and cloud audit logs.
·       Experience with one or more scripting languages (Python, PowerShell, shell) to support investigations, enrichment, and analysis.
·       Strong written and verbal communication skills, including clear ticket documentation, incident reporting, and stakeholder updates.
·       Excellent analytical and problem-solving skills with a bias toward action and operational rigor.
Preferred Qualifications (One or More Areas of Depth)
·       Forensics: Endpoint or cloud forensics, evidence handling, artifact interpretation, malware triage.
·       Threat Hunting: Demonstrated experience leading hypothesis-driven hunts and operationalizing results into detections, playbooks, and response improvements (e.g., ATT&CK mapping and coverage tracking).
·       Detection Engineering: Detection lifecycle ownership (build/test/deploy/tune/retire), alert quality improvement, playbook development.

Find yourself checking a lot of these boxes but doubting whether you should apply? At Alteryx, we support a growth mindset for our associates through all stages of their careers. If you meet some of the requirements and you share our values, we encourage you to apply. As part of our ongoing commitment to a diverse, equitable, and inclusive workplace, we’re invested in building teams with a wide variety of backgrounds, identities, and experiences.





This position involves access to software/technology that is subject to U.S. export controls. Any job offer made will be contingent upon the applicant’s capacity to serve in compliance with U.S. export controls.




لقد تمت ترجمة هذا الإعلان الوظيفي بواسطة الذكاء الاصطناعي وقد يحتوي على بعض الاختلافات أو الأخطاء البسيطة.

لقد تجاوزت الحد الأقصى المسموح به للتنبيهات الوظيفية (15). يرجى حذف أحد التنبيهات الحالية لإضافة تنبيه جديد.
تم إنشاء تنبيه وظيفي لهذا البحث. ستصلك إشعارات فور الإعلان عن وظائف جديدة مطابقة.
هل أنت متأكد أنك تريد سحب طلب التقديم إلى هذه الوظيفة؟

لن يتم النظر في طلبك لهذة الوظيفة، وسيتم إزالته من البريد الوارد الخاص بصاحب العمل.