About the job
Join Us in Shaping the Future of Cyber Security.
At Quantexa, we believe in the power of innovation and continuous improvement. Our mission is to forge meaningful relationships with our clients and drive impactful change across various industries. With a diverse workforce comprising over 50 nationalities and 20 languages spoken, we foster an inclusive environment where every voice matters. Here, you will find the autonomy and support needed to craft a career that aligns with your aspirations.
The Role.
We are seeking a proactive and technically skilled Cyber Security Engineer to join our Security Operations team. In this hands-on role, you will be instrumental in safeguarding Quantexa's digital assets. Your responsibilities will include the operational management, optimization, and monitoring of essential security platforms, focusing on Zscaler, cloud monitoring via Wiz, and endpoint detection and response through CrowdStrike.
Collaborating closely with the broader Security Operations team, you will ensure that security alerts, findings, and detections are efficiently triaged, validated, documented, and remediated. Your contributions will directly enhance Quantexa's security posture by minimizing risk, bolstering detection capabilities, and ensuring timely responses to security incidents.
This position is ideal for a curious and detail-oriented professional who thrives on working with cutting-edge security tools, embraces disciplined execution, and seeks opportunities for ongoing improvement.
Your Responsibilities.
Wiz (Cloud Security Posture Management)
- Daily monitoring and triaging of Wiz findings, validating alerts and assessing operational impact.
- Engaging in tuning and threat hunting within Wiz and other security tools.
- Identifying misconfigurations, excessive permissions, and exposed assets while escalating issues as necessary.
- Tracking remediation progress with engineering teams and ensuring the resolution of high-priority issues.
Zscaler (Web Security Tunnel 2.0)
- Reviewing and triaging Zscaler alerts and policy violations according to documented response procedures.
- Investigating suspicious traffic, access attempts, and user activity to determine legitimacy.

