Back to Search
Overview
Mid-Level

Security Engineer - SOC Analyst

Confirmed live in the last 24 hours

Neo4j

Neo4j

Malmö
Hybrid
Posted February 26, 2026

Job Description

About Neo4j:

Neo4j is the graph intelligence platform that transforms data into knowledge to power the next generation of intelligent applications and AI systems. It includes enterprise-ready knowledge graphs for accurate, explainable, and governed AI; the most comprehensive, trusted, and easy-to-deploy graph capabilities across any environment and data source; and an unmatched ecosystem trusted by 84 of the Fortune 100 and supported by the world’s largest graph community. Intelligence that works. Results that matter.

Built to work everywhere and integrate with everything across every cloud for dynamic, personalized, and autonomous AI systems. We deliver quicker results, contextual knowledge, and solutions that impact customers and employees across the business.

Our Vision: 

At Neo4j, we have always strived to help the world make sense of data.  

As business, society and knowledge become increasingly connected, our technology promotes innovation by helping organizations to find and understand data relationships. We created, drive and lead the graph database category, and we’re disrupting how organizations leverage their data to innovate and stay competitive.

The Role:

Working with the Security Operations Lead, in this role you will operate our security operations capability so that it provides an appropriate monitoring, detection, investigation and response capability. Using a range of tools, working with your security engineering colleagues, you will be part of a team building a SOC service that supports our client and internal services.

Core responsibilities:

You will be responsible for:

  • Incident triage, analysis, response and investigations based on alerts.
  • Monitoring and responding to endpoint detection and response.
  • Investigating detected, suspicious behaviours and escalating as appropriate.
  • Proactively investigating alerts and suspicious activities, following through to gain a full understanding of the behaviour.
  • Adding context to a confirmed incident to aid understanding and response.
  • Supporting the development of incident handling procedures.
  • Supporting incident/crisis management.
  • Identifying, documenting and developing detections.
  • Building and developing incident playbooks.
  • Creating reports and visualisations of attacks.
  • Tracking trends for metrics and reporting.
  • Briefing the CISO on alert findings and their impact on the business.
  • Continuously working to decrease false positives.
  • Maintaining the detection rules database.

Competencies:

To be successful in this role you should:

  • Have a minimum of 5 years experience or knowledge in security operations or related roles.
  • Enjoy the challenge of delivering security into business operations.
  • Work independently to perform analyses and investigations
  • Have experience or knowledge of working in modern cloud environments, such as AWS, GCP or Azure.
  • Have experience using Security Information Event Management (SIEM) and related technologies.
  • Have experience using Endpoint Detection & Response (EDR) and related technologies.
  • Have strong analytical and investigation skills.
  • Be proficient in several programming languages, including Python, and/or PHP. 
  • Have excellent written and verbal communication skills as well as receptive listening skills, with ability to present complex ideas in a clear, concise fashion to technical and non-technical audiences.
  • Proactively contribute ideas to the development of security at Neo4j.
  • Have an awareness of hacking techniques and trends and investigation or awareness of Cyber Threat Intelligence in a business context.

Nice to h

pythongorustawsgcpazureaidataanalyticsproduct