Bruker Corporation

Associate Cybersecurity Analyst

Job Locations IN-Nehru Place
Posted Date 9 hours ago(2/2/2026 2:00 AM)
Req. #
2026-18848
Position Type
Employee

Overview

Bruker is enabling scientists to make breakthrough discoveries and develop new applications that improve the quality of human life. Bruker’s high-performance scientific instruments and high-value analytical and diagnostic solutions enable scientists to explore life and materials at molecular, cellular and microscopic levels. In close cooperation with our customers, Bruker is enabling innovation, improved productivity and customer success in life science molecular research, in applied and pharma applications, in microscopy and nano analysis, and in industrial applications, as well as in cell biology, preclinical imaging, clinical phenomics and proteomics research and clinical microbiology.

 

Today, worldwide more than 11,000 employees are working on this permanent challenge at over 90 locations on all continents. Bruker continues to build upon its extensive range of products and solutions, its broad base of installed systems and a strong reputation among its customers. Being one of the world's leading analytical instrumentation companies, Bruker is strongly committed to further fully meeting its customers’ needs as well as to continue to develop state-of-the-art technologies and innovative solutions for today's analytical questions.

Responsibilities

As an Associate Cybersecurity Analyst, you will be the first line of defense against cyber threats. You will monitor, analyze, and respond to security incidents, ensuring the confidentiality, integrity, and availability of critical systems. This role requires strong technical expertise, analytical skills, and a proactive approach to threat detection and mitigation.

Key Responsibilities

  • Monitor and analyze security alerts from SIEM and XDR platforms (Microsoft Defender and Microsoft Sentinel preferred).
  • Investigate and respond to security incidents, including containment, eradication, and recovery activities.
  • Perform log analysis and develop/customize detection rules using KQL (Kusto Query Language).
  • Conduct phishing investigations and apply industry-standard email security best practices.
  • Collaborate with IT and security teams to implement preventive measures and enhance the overall security posture.
  • Utilize frameworks such as MITRE ATT&CK and Cyber Kill Chain for threat modeling, analysis, and threat hunting.
  • Conduct health checks on Azure Virtual Machines and other Azure cloud resources.
  • Prepare detailed incident reports, dashboards, and trend analytics for stakeholders.
  • Support and execute the Senior Vulnerability Analyst with full vulnerability management lifecycle across servers, endpoints, applications, and cloud workloads.
  • Support with vulnerability scanning using tools such as Tenable, analyze results, validate true positives, and identify high‑risk exposures.
  • Coordinate with IT, infrastructure, and application teams to track remediation activities and ensure vulnerabilities are addressed within defined SLAs.
  • Prioritize vulnerabilities based on severity, business impact, exploitability, and threat intelligence insights.
  • Maintain vulnerability metrics, generate weekly/monthly reports, and escalate critical risks as required.
  • Contribute to improving detection coverage, configuration hygiene, and reducing recurring or systemic vulnerabilities.

Qualifications

Required Skills & Qualifications

  • Education: Bachelor’s degree in computer science, Information Technology, or related field.
  • Experience: 2-3 years in SOC operations or cybersecurity roles.
  • Hands-on experience (minimum 1 year) with Linux/Unix OS administration and security.
  • Strong knowledge of Microsoft XDR and Microsoft Sentinel for threat detection and response.
  • Proficiency in KQL for log analysis and custom detection rules.
  • Solid understanding of incident handling processes (containment, eradication, recovery).
  • Familiarity with phishing investigation techniques and email security best practices.
  • Knowledge of MITRE ATT&CK framework, Cyber Kill Chain, and threat hunting methodologies.
  • Experience in managing and securing Azure Virtual Machines.
  • Strong analytical and problem-solving skills with attention to detail.
  • Excellent communication and reporting skills for cross-team collaboration.

Why Join Us?

  • Opportunity to work with cutting-edge cybersecurity technologies.
  • Collaborative and growth-oriented work environment.
  • Continuous learning and professional development programs.

Options

Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
Share on your newsfeed