More jobs:
Information Security Data Analyst; Tier 1- onsite
Job in
Irvine, Orange County, California, 92713, USA
Listed on 2026-03-01
Listing for:
Calance
Full Time
position Listed on 2026-03-01
Job specializations:
-
IT/Tech
Cybersecurity, Security Manager, Information Security
Job Description & How to Apply Below
Description
The ideal candidate as Information Security Data Analyst (Tier
1) will provide frontline monitoring and analysis of security events, support incident response, perform basic vulnerability assessments, and assist with compliance and reporting activities. This role will require understanding and use of SIEM, EDR, cloud security, and security frameworks.
- Monitor SIEM, EDR, and network security tools for alerts and anomalies
- Analyze logs from servers, endpoints, firewalls, and cloud platforms to identify suspicious activity
- Escalate validated incidents to Tier 2/3 analysts with clear documentation
- Assist in initial triage of security incidents under senior analyst guidance
- Collect evidence, document findings, and support containment steps
- Participate in communication workflows during active incidents
- Run vulnerability scans and track remediation progress with IT teams
- Support basic risk assessments and vendor security reviews
- Help identify misconfigurations or policy violations across systems
- Prepare monthly security metrics, dashboards, and compliance reports
- Maintain documentation of incidents, findings, and remediation steps
- Assist with NIST CSF, PCI DSS, and internal audit tasks
- Contribute to updating security policies, standards, and procedures
- Review threat intel feeds for emerging risks
- Participate in basic threat hunting activities to detect anomalies
- Stay up-to-date on the latest vulnerabilities, threats, and attacks around the world; research and recommend new security solutions.
- Be a team player, considering Information Security as a service.
- 1-2 years of experience in cybersecurity data analysis or SOC support
- Foundational knowledge of networking, operating systems, and cloud (AWS/Azure)
- Exposure to SIEM/EDR tools (Sentinel One, Reliaquest, Defender, Splunk)
- Basic understanding of vulnerabilities, exploits, least privilege, and encryption
- Familiarity with vulnerability scanners (Qualys, Nessus, Rapid7)
- Basic scripting skills (Power Shell or Python) are a plus
- Strong analytical and problem solving abilities
- Clear written communication for incident documentation and reporting
- Ability to work collaboratively in a team environment
- Industry and Security Certifications are preferred
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here:
×