SailPoint Logo

SailPoint

Junior Security Analyst

Posted 12 Hours Ago
Be an Early Applicant
Remote or Hybrid
Hiring Remotely in México
Entry level
Remote or Hybrid
Hiring Remotely in México
Entry level
The Junior Security Analyst will support the SOC team in monitoring security events, responding to incidents, and learning foundational cybersecurity concepts while enhancing threat intelligence processes.
The summary above was generated by AI

SailPoint’s Cybersecurity organization is seeking a Junior Security Analyst with a passion for cybersecurity and protecting the organization.

The role is an entry-level role supporting the SOC team in monitoring, analyzing, and responding to security events and events of interest. This role focuses on learning foundational cybersecurity concepts, assisting with basic event analysis, and gaining exposure to purple teaming and threat intelligence processes. Applicants should embrace the opportunity to work across diverse platforms with a variety of tools and will play a key role as we continually improve our capabilities.

The ideal candidate will embody SailPoint's 4 I’s of Integrity, Individuals, Impact, and Innovation. They will embrace new challenges and contribute positively to our established team of talented and dedicated teammates to achieve our security objectives.

This role reports directly to the Americas SOC Manager, can be remote anywhere in Mexico, and will be working a mid-day shift with hours from 1:00 PM-10:00 PM CDT.

Responsibilities:

  • Monitor security events using Security Information and Event Management (SIEM) systems and endpoint detection/response (EDR) tools.

  • Perform initial triage of events and events of interest under supervision, escalating potential incidents to senior team members as needed.

  • Assist in documenting events and maintaining response playbooks for events of interest and potential incidents.

  • Support proactive threat monitoring by reviewing logs and alerts for suspicious activity.

  • Participate in foundational purple team exercises, such as observing tabletop simulations or blue/red team collaborations, to understand detection and response gaps.

  • Assist in collecting and organizing threat intelligence data (e.g., indicators of compromise [IOCs]) from open-source feeds or internal reports.

  • Conduct basic risk enumeration tasks, such as identifying vulnerabilities using provided scanning tools.

  • Engage in training to learn threat hunting basics and threat intelligence fundamentals.

  • Leverage provided resources to continuously increase knowledge of tools and best practices in forensics, incident response, and your understanding of advanced persistent threats, including tools, techniques, and procedures of attackers

Requirements: 

  • Bachelor’s degree in Cybersecurity, Computer Science, or related field (or equivalent experience).

  • 0–2 years of experience in cybersecurity or IT.

  • Basic understanding of networking, operating systems (Windows/Linux), and security principles.

  • Familiarity with SIEM tools (e.g., Splunk, QRadar) and EDR platforms.

  • Interest in purple teaming concepts and threat intelligence processes.

  • Strong analytical skills and eagerness to learn.

  • Relevant certifications (e.g., CompTIA Security+, CySA+) are preferred but not required.     

Desired:

  • Ability to quickly pick up and learn new technologies

  • Able to collaborate with cross-functional teams

  • A willingness to be challenged and a strong desire to learn

  • English written and spoken proficiency and communications skills

  • A foundational understanding of applications, networks, cloud architecture, and coding concepts

The Path to Success (Milestones):

  • 30-Day Milestones (The "Learning" Phase):

    • Build familiarity with the primary security tools (SOAR, SIEM, EDR), demonstrating the ability to log in and navigate the systems.

    • Understand how to locate and open security events and where key information resides.

    • Begin shadowing senior team members to understand the basics of the triage process.

  • 60-Day Milestones (The "Connecting" Phase):

    • Begin to independently identify the appropriate next steps in an investigation based on the event type (e.g., knowing to look at a process tree in EDR for a malware event).

    • Show proficiency in navigating to the correct information within the security stack without direct guidance.

    • Start performing basic triage on low-level events with supervision.

  • 90-Day Milestones (The "Contribution" Phase):

    • Can articulate the "what" and "why" of investigation steps for basic security events.

    • Demonstrate a foundational understanding of the environment and can triage common alerts by following established playbooks.

  • 6-Month Milestones (The "Performance" Phase):

    • Triage events independently, following established documentation and processes.

    • Demonstrate comfort in performing all subtasks required for an investigation and know when it is appropriate to escalate.

    • Actively incorporate feedback from the QA process to improve investigation quality.

  • 1-Year Milestones (The "Mastery" Phase):

    • Triage events consistently and confidently, with investigation quality in line with team standards.

    • Require minimal feedback for common event types.

    • Start identifying potential areas for rule tuning, security control and process improvements.

SailPoint is an equal opportunity employer and we welcome all qualified candidates to apply to join our team.  All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, protected veteran status, or any other category protected by applicable law.  

Alternative methods of applying for employment are available to individuals unable to submit an application through this site because of a disability. Contact [email protected] or mail to 11120 Four Points Dr, Suite 100, Austin, TX 78726, to discuss reasonable accommodations.  NOTE: Any unsolicited resumes sent by candidates or agencies to this email will not be considered for current openings at SailPoint.

Top Skills

Endpoint Detection/Response (Edr) Tools
Networking
Operating Systems (Windows/Linux)
Security Information And Event Management (Siem)

Similar Jobs at SailPoint

12 Hours Ago
Remote or Hybrid
Mid level
Mid level
Artificial Intelligence • Cloud • Sales • Security • Software • Cybersecurity • Data Privacy
The Security Analyst will triage and investigate security events, update playbooks, conduct threat hunting, and collaborate with cross-functional teams to improve security capabilities.
Top Skills: EdrPowershellPythonSIEM
3 Days Ago
Remote or Hybrid
Mid level
Mid level
Artificial Intelligence • Cloud • Sales • Security • Software • Cybersecurity • Data Privacy
The Procurement Contracts Administrator manages the contract lifecycle, supports procurement activities, and collaborates with stakeholders on contract needs and audits.
9 Days Ago
Remote or Hybrid
Mid level
Mid level
Artificial Intelligence • Cloud • Sales • Security • Software • Cybersecurity • Data Privacy
The Procurement Specialist manages the procurement process for administrative departments, ensuring compliance and supplier performance while developing product specifications and negotiating contracts.
Top Skills: Technology HardwareTechnology Software

What you need to know about the San Francisco Tech Scene

San Francisco and the surrounding Bay Area attracts more startup funding than any other region in the world. Home to Stanford University and UC Berkeley, leading VC firms and several of the world’s most valuable companies, the Bay Area is the place to go for anyone looking to make it big in the tech industry. That said, San Francisco has a lot to offer beyond technology thanks to a thriving art and music scene, excellent food and a short drive to several of the country’s most beautiful recreational areas.

Key Facts About San Francisco Tech

  • Number of Tech Workers: 365,500; 13.9% of overall workforce (2024 CompTIA survey)
  • Major Tech Employers: Google, Apple, Salesforce, Meta
  • Key Industries: Artificial intelligence, cloud computing, fintech, consumer technology, software
  • Funding Landscape: $50.5 billion in venture capital funding in 2024 (Pitchbook)
  • Notable Investors: Sequoia Capital, Andreessen Horowitz, Bessemer Venture Partners, Greylock Partners, Khosla Ventures, Kleiner Perkins
  • Research Centers and Universities: Stanford University; University of California, Berkeley; University of San Francisco; Santa Clara University; Ames Research Center; Center for AI Safety; California Institute for Regenerative Medicine

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account