top of page
Sofia, Plovdiv, Varna, Burgas, Skopje
  • ic_facebook_2x
  • ic_linkedin_2x
  • ic_tweeter_2x

Are you a seasoned Security Operations Center Analyst willing to grow as a professional and work on large-scale projects, using technology stack that is both diverse and cutting-edge? Are you passionate about innovative and top-notch software solutions and want to be part of like-minded professionals? Do you enjoy working in a fast-paced, yet collaborative environment?

If your answer is “Yes”, we would love to talk to you.

Who are we looking for?

In this position you will be an integral part of a developing enterprise Information Security Program. Your focus will be on security threat identification and incident escalation activities, as well as working with engineers to design and implement more effective security monitoring solutions. As a Security Operations Center Analyst at Shutterfly, you will be exposed to all areas of information security as we continue to grow our team. This is an excellent opportunity to push your career and flex your skillset in all areas of security operations.

What your responsibilities are going to be?

  • Monitor and interpret data from a number of security monitoring platforms (e.g. IPS/IDS,

  • Next-Gen Firewall, heuristic endpoint protection tools, vulnerability scanners, etc.)

  • Perform log analysis and network forensics to support the incident response mission.

  • Execute incident response processes and procedures

  • Monitor public security advisories and alerts for information related to threats and vulnerabilities

  • Monitor and respond to alerts supporting the identification phase of the incident response process.

  • Provide support for incident response and vulnerability management efforts.

  • Drive efforts to improve and further build out the security monitoring tools.

  • Maintain knowledge of current security trends and be able to clearly communicate them to the team.

  • Support Information Security team in all areas of information security

  • Document all incident analysis and response activity in a structured ticketing system

  • Generate shift-handoff documentation and facilitate knowledge transfer to oncoming analysts


What would be considered as an advantage?

  • Security+, GSEC, GCIH, GCIA certifications

  • Experience with internal security assessments/reviews

  • Understand information security concepts, protocols, "industry best practices"

  • Understand malware analysis, packet analysis and forensic investigation techniques

  • Hands-on experience with security technologies from the following vendors preferred: Splunk or other comparable SIEM tools, Palo Alto Networks Firewalls, Heuristic endpoint protection tools

  • Experience with Endpoint Security and MDM solutions

Personal Information


Please, provide a CV, motivation letter or additional supportive documents (portfolio, projects description, related pictures, etc.). Allowed file formats (.pdf, .doc, .docx).

* Indicates required fields

Upload CV

On the web

Banner_Product Owner_2x.png

DevOps and Security

Security Operations Center Analyst

bottom of page