Bolt

Security Analyst

Tallinn, Estonia Full Time
<gh-intro>
<text>
We are looking for a new team member to increase our security analysis capabilities. In this role, you will use data analysis tools and techniques to identify threats from a set of logs collected centrally. You will provide assistance in understanding the gaps we have and how to improve our visibility and coverage of threats both new and everlasting. This role contributes to maintaining situational awareness about cyber threats and their impact on our internal assets (users, data, devices, etc). You will work with security engineers from other Information Security subteams, IT, and privacy experts among others.
</text>
</gh-intro>

<gh-about-us>
<title>About us</title>
<text>
With over 200 million customers in 50+ countries, Bolt is one of the fastest-growing tech companies in Europe and Africa. And it's all thanks to our people.

We believe in creating an inclusive environment where everyone is welcome, regardless of race, colour, religion, gender identity, sexual orientation, national origin, age, or disability.

Our ultimate goal is to make cities for people, not cars, and we need your help to achieve this mission!
</text>
</gh-about-us>

<gh-role-detail>
<title>About the role</title>
<text>
We are hiring a Security Analyst for the Internal Security team.


Internal Security is a sub-team of the Information Security team in charge of the security of Bolt internal systems and assets. The main responsibilities of the team include securing our assets by supporting asset and vulnerability management, providing technical expertise in malware and forensic analysis, data loss prevention, threat intelligence, detection engineering, maintaining and developing our internal security tooling and automations, and assisting the compliance team in passing audits.

This is a position for you if you are a security professional with a knack for security event and data analysis, or an experienced data analyst/scientist looking to pivot into cybersecurity.
</text>
</gh-role-detail>

<gh-responsibilities>
<title>Main tasks and responsibilities:</title>
<bulletpoints>
<point>Review logs across disparate systems to identify "low and slow" lateral movement or suspicious patterns that individual system alerts might miss.</point>
<point>Analyze behavior patterns for signs of credential theft, account hijacking, or disgruntled employee activity (e.g., bulk data downloads, off-hours access).</point>
<point>Perform deep-dive reviews of activity from "Admin" or "Superuser" accounts to ensure least-privilege compliance and detect privilege escalation.</point>
<point>Provide input to our detection engineering process by pointing out gaps in logs and missing detections.</point>
<point>Participate in our on-duty rotation (from 9:00 to 17:00 every workday) to handle detections and requests to the Internal Security team.</point>
</bulletpoints>
</gh-responsibilities>

<gh-requirements>
<title>About you:</title>
<bulletpoints>
<point>Demonstrated interest and passion for cybersecurity.</point>
<point>Professional experience with data analysis tools or SIEM tooling (proficiency in advanced query building capabilities in platforms like ELK or LogScale).</point>
<point>Strong problem-solving and analytical skills to assess threats, identify root causes, and suggest security improvements.</point>
<point>Proactive attitude – building your own roadmap for your topics and making a case for it to the Internal Security Manager.</point>
<point>Ability to use Bash, Python, or another language to automate log parsing and data normalization.</point>

<point>You will get extra credits for:</point>

<point>University degree in cybersecurity, natural sciences, computer science, or mathematics.</point>
<point>Prior experience in a data science, data analysis role, or within the application security domain.</point>
<point>Experience in incident response, including log analysis and mitigation strategies.</point>
<point>Prior experience in forensic analysis.</point>
<point>Above average administrative skills on macOS.</point>
<point>Strong understanding of internal networking protocols and traffic patterns.</point>
<point>Understanding of Identity & Access Management, including RBAC (Role-Based Access Control) and PAM (Privileged Access Management).</point>
</bulletpoints>
<text>
Experience is great, but what we really look for is drive, intelligence, and integrity. So even if you don’t tick every box, please consider applying if you feel you’re the kind of person described above!
</text>
</gh-requirements>

<gh-perks>
<title>Why you’ll love it here:</title>
<bulletpoints>
<point>Play a direct role in shaping the future of mobility.</point>
<point>Impact millions of customers and partners in 600+ cities across 50+ countries.</point>
<point>Work in fast-moving autonomous teams with some of the smartest people in the world.</point>
<point>Accelerate your professional growth with unique career opportunities.</point>
<point>Get a rewarding salary and stock option package that lets you focus on doing your best work.</point>
<point>Enjoy the flexibility of working in a hybrid mode with a minimum of 2 days in the office each week to foster strong connections and teamwork.</point>
<point>Take care of your physical and mental health with our wellness perks.</point>
</bulletpoints>
<text>*Some perks may differ depending on your location and role.</text>
</gh-perks>
 

#LI-Hybrid