
Security Operations Analyst at Calabrio. Are you driven by innovation and looking to thrive in a fast-paced, growing environment? Join us at Calabrio and be part of our dynamic team! Help us in reshaping the landscape of customer experience – where every interaction becomes an opportunity, and every insight drives meaningful change. . Introducing Calabrio. – The trailblazers in customer experience intelligence! Revolutionizing the way organizations connect with their customers, we empower businesses to elevate every interaction to new heights. Our cutting-edge cloud platform, coupled with AI-driven analytics tools, unlocks the true essence of customer sentiment, turning data into actionable insights with lightning speed. . We are looking for a Information Security & Incident Response Analyst to lead day-to-day security operations and help build and maintain our defensive posture. You’ll be responsible for both investigating and responding to security threats, as well as driving broader security initiatives like vulnerability management, compliance support, and security monitoring. This is a hands-on, cross-functional role ideal for someone who can shift between immediate incident handling and long-term risk reduction. . What you’ll be doing: . Incident Response . Monitor and triage security alerts from SIEM, EDR, and cloud-native tools . Investigate suspicious activity and coordinate response efforts . Lead or support incident containment, remediation, and recovery . Document incident timelines, root cause, and lessons learned . Maintain and improve IR playbooks and escalation workflows . Security Operations . Support vulnerability management, threat intelligence, and log review . Assist with compliance audits and reporting (FedRAMP, HIPAA, GDPR) . Deploy and manage security tools in AWS and Azure environments . Collaborate with DevOps, IT, and Engineering to harden infrastructure . Contribute to the development of security policies and awareness programs . Collaboration & Continuous Improvement . Share insights and findings across teams to reduce future risks . Identify process gaps and propose improvements to security workflows . Stay informed on new threats, tools, and regulatory updates . Participate in tabletop exercises and cross-functional response planning . Bachelor’s degree in cybersecurity, computer science, or related field—or equivalent experience . 3+ years in a cybersecurity role with incident response or SOC experience . Familiarity with the MITRE ATT&CK framework and standard IR workflows . Strong working knowledge of AWS and Azure security tools and architecture . Experience with SIEM (e.g., Data Dog), EDR (e.g., CrowdStrike, SentinelOne), and network logs . Familiarity with FedRAMP, HIPAA, and GDPR security and reporting standards . Clear, concise communicator who can document technical findings for mixed audiences . Ability to adapt quickly, ask the right questions, and drive decisions under pressure . . Preferred Qualifications . Certifications such as GCIH, GCFA, CySA+, AWS Security Specialty, or Azure Security Engineer . Experience with scripting (Python, PowerShell) or SOAR tools . Background in vulnerability management or cloud forensics . Prior experience in a regulated or SaaS environment . . Company Location: Canada.