Cybersecurity Analyst

Our client is a remote-first, dynamic international product company in the iGaming field. Currently we’re on the lookout for an experienced Cybersecurity Analyst for their team.

 

MAIN TASK:

Ensure continuous visibility into the company’s security posture through proactive monitoring, detection, and analysis of potential threats and incidents. Build and maintain a robust cybersecurity monitoring ecosystem to protect business-critical infrastructure, gambling platform, and corporate systems.

 

RESPONSIBILITIES:

  • Continuously monitor security events, alerts, and logs from infrastructure, applications, and network components.
  • Develop detection rules and correlation logic to identify potential incidents, anomalies, and suspicious activity.
  • Design, configure, and maintain SIEM systems (e.g., Splunk, ELK, Wazuh, Graylog) for comprehensive event collection and correlation.
  • Analyze and triage security alerts to distinguish false positives from genuine threats.
  • Conduct initial investigation, enrichment, and classification of security events.
  • Contribute to root-cause analysis and post-incident reviews.
  • Optimize log collection pipelines (agents, parsers, enrichment).
  • Develop custom dashboards, metrics, and reporting for SOC visibility.
  • Maintain data quality, retention policies, and performance of the monitoring infrastructure.
  • Work closely with DevOps, Network, and Platform Engineering teams to ensure log visibility across all layers.

 

REQUIREMENTS:

  • 3+ years in cybersecurity monitoring, SOC operations, or security analytics.
  • Experience in environments with mixed on-premise (bare metal) and cloud infrastructure.
  • Experience with SIEM tools (e.g., Splunk, ELK Stack, Wazuh, Graylog, Sentinel, QRadar).
  • Strong understanding of log formats, network protocols, and system telemetry.
  • Knowledge of Linux/Windows system internals and security event sources.
  • Experience with scripting (Python, Bash, PowerShell) for automation and analysis.
  • Familiarity with EDR, IDS/IPS, NDR, and threat intelligence integrations.
  • Analytical mindset and attention to detail.
  • Ability to prioritize and triage multiple alerts effectively.
  • Clear communication of technical findings to non-technical stakeholders.
  • Proactive approach to continuous improvement and security hygiene.
  • (As a plus) Experience in high-load, regulated, or 24/7 production environments (e.g., iGaming, FinTech, telecom).

 

WE OFFER:

  • Possibility of a remote work from anywhere in the world.
  • Generous days-off policy (vacation, sick leave, days off, holidays).
  • Guaranteed performance reviews & career plan development.
  • Low bureaucracy level, with decisions made quickly.
  • Open-minded and easy-going management.
  • Friendly atmosphere among people who love their work.

Required skills experience

SIEM: Splunk & ELK
Linux
IDS/IPS
EDR
SIEM: Splunk & ELK, Linux/Windows, basic powershell/bash/python scripting, IDS/IPS, EDR, NDR
Published 22 October
80 views
·
9 applications
88% read
To apply for this and other jobs on Djinni login or signup.
Loading...