About this role
<div class="content-intro"><h2>Why Choose Bottomline?</h2>
<p>Are you ready to transform the way businesses pay and get paid? Bottomline is a global leader in business payments and cash management, with over 35 years of experience and moving more than $16 trillion in payments annually. We're looking for passionate individuals to join our team and help drive impactful results for our customers. If you're dedicated to delighting customers and promoting growth and innovation - we want you on our team!</p></div><p><span data-contrast="auto">Security Operations Analyst II</span><span data-ccp-props="{"335559739":200}"> </span></p>
<p><em><span data-contrast="auto">POSITION SUMMARY</span></em><span data-ccp-props="{"335559739":200}"> </span></p>
<p><span data-contrast="auto">The Security Operations Analyst II is an exciting role within our global Security Operations Center, providing security monitoring, incident analysis, and coordinated response to protect payment processing infrastructure. Based in India, this position delivers critical coverage during India business hours as part of our follow-the-sun model, bridging US and EU teams across time zones.</span><span data-ccp-props="{"335559739":200}"> </span></p>
<p><span data-contrast="auto">This role requires strong technical proficiency, clear communication for global coordination, and the ability to independently manage security incidents from detection through resolution. The right candidate brings proven investigative skills and solid operational instincts -- ready to contribute meaningfully while learning the nuances of our environment through hands-on training and shadowing.</span><span data-ccp-props="{"335559739":200}"> </span></p>
<p><em><span data-contrast="auto">KEY RESPONSIBILITIES</span></em><span data-ccp-props="{"335559739":200}"> </span></p>
<p><em><span data-contrast="auto">Security Monitoring and Analysis</span></em><span data-ccp-props="{"335559739":200}"> </span></p>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="6" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Monitor SIEM platforms, EDR tools, and network security appliances for indicators of compromise and anomalous activity</span><span data-ccp-props="{"335559739":200}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="6" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Triage, investigate, and respond to security alerts -- distinguish true positives from noise through analysis of logs, network traffic, endpoint telemetry, and threat intelligence</span><span data-ccp-props="{"335559739":200}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="6" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Monitor report mailboxes and escalation queues; assess priority and pivot to investigation or response as needed</span><span data-ccp-props="{"335559739":200}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="6" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-aria-posinset="4" data-aria-level="1"><span data-contrast="auto">Conduct proactive threat hunting to identify threats that evade automated detection</span><span data-ccp-props="{"335559739":200}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="6" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-aria-posinset="5" data-aria-level="1"><span data-contrast="auto">Collaborate with IT, network engineering, and application teams during triage to gather context and coordinate response</span><span data-ccp-props="{"335559739":200}"> </span></li>
</ul>
<p><em><span data-contrast="auto">Incident Response and Coordination</span></em><span data-ccp-props="{"335559739":200}"> </span></p>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="7" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Serve as incident coordinator during assigned shifts, orchestrating response across distributed global teams</span><span data-ccp-props="{"335559739":200}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="7" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Execute containment, eradication, and recovery actions per established playbooks</span><span data-ccp-props="{"335559739":200}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="7" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Coordinate with US and EU personnel during incident handoffs with clear, comprehensive briefings</span><span data-ccp-props="{"335559739":200}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="7" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-aria-posinset="4" data-aria-level="1"><span data-contrast="auto">Engage stakeholders to facilitate system isolation, evidence collection, and remediation</span><span data-ccp-props="{"335559739":200}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="7" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-aria-posinset="5" data-aria-level="1"><span data-contrast="auto">Document incident timelines, actions, and lessons learned per compliance requirements</span><span data-ccp-props="{"335559739":200}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="7" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-aria-posinset="6" data-aria-level="1"><span data-contrast="auto">Escalate critical incidents to senior leadership with situation assessments and recommended actions</span><span data-ccp-props="{"335559739":200}"> </span></li>
</ul>
<p><em><span data-contrast="auto">Global Operations and Process Improvement</span></em><span data-ccp-props="{"335559739":200}"> </span></p>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="8" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Provide seamless follow-the-sun coverage, participating in daily global SOC briefings</span><span data-ccp-props="{"335559739":200}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="8" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Collaborate with security engineering to tune detection rules and reduce false positives</span><span data-ccp-props="{"335559739":200}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="8" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Refine playbooks, procedures, and documentation based on operational experience</span><span data-ccp-props="{"335559739":200}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="8" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-aria-posinset="4" data-aria-level="1"><span data-contrast="auto">Stay current with emerging threats and industry best practices in financial services security</span><span data-ccp-props="{"335559739":200}"> </span></li>
</ul>
<p><em><span data-contrast="auto">QUALIFICATIONS</span></em><span data-ccp-props="{"335559739":200}"> </span></p>
<p><em><span data-contrast="auto">Experience</span></em><span data-ccp-props="{"335559739":200}"> </span></p>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="9" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">3-5 years in security operations with progression from junior to intermediate responsibilities</span><span data-ccp-props="{"335559739":200}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="9" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Minimum 2 years hands-on incident investigation and response in enterprise environments</span><span data-ccp-props="{"335559739":200}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="9" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Experience in global or distributed SOC teams with cross-timezone coordination</span><span data-ccp-props="{"335559739":200}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="9" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-aria-posinset="4" data-aria-level="1"><span data-contrast="auto">Financial services, payment processing, or regulated industry background preferred</span><span data-ccp-props="{"335559739":200}"> </span></li>
</ul>
<p><em><span data-contrast="auto">Technical Skills</span></em><span data-ccp-props="{"335559739":200}"> </span></p>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="10" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Strong SIEM proficiency (Splunk, QRadar, Sentinel, or similar) including query development</span><span data-ccp-props="{"335559739":200}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="10" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">EDR experience (CrowdStrike, Carbon Black, Defender, or SentinelOne)</span><span data-ccp-props="{"335559739":200}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="10" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Network protocol knowledge (TCP/IP, DNS, HTTP/S) and packet analysis skills</span><span data-ccp-props="{"335559739":200}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="10" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-aria-posinset="4" data-aria-level="1"><span data-contrast="auto">Windows and Linux investigation techniques; scripting ability (Python, PowerShell, or Bash)</span><span data-ccp-props="{"335559739":200}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="10" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-aria-posinset="5" data-aria-level="1"><span data-contrast="auto">Familiarity with MITRE ATT&CK and common attacker TTPs</span><span data-ccp-props="{"335559739":200}"> </span></li>
</ul>
<p><em><span data-contrast="auto">Education and Certifications</span></em><span data-ccp-props="{"335559739":200}"> </span></p>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="11" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Bachelor's degree in Computer Science, Cybersecurity, or related field; equivalent experience considered</span><span data-ccp-props="{"335559739":200}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="11" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Security certifications (Security+, GCIH, CEH) valued; advanced certs (GCIA, GCFA, CISSP) a plus</span><span data-ccp-props="{"335559739":200}"> </span></li>
</ul>
<p><em><span data-contrast="auto">Preferred</span></em><span data-ccp-props="{"335559739":200}"> </span></p>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="12" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Cloud security monitoring experience (AWS, Azure, or GCP)</span><span data-ccp-props="{"335559739":200}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="12" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">SOAR platform experience; threat intelligence integration</span><span data-ccp-props="{"335559739":200}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="12" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Digital forensics background; PCI DSS familiarity</span><span data-ccp-props="{"335559739":200}"> </span></li>
</ul>
<p><em><span data-contrast="auto">CORE COMPETENCIES</span></em><span data-ccp-props="{"335559739":200}"> </span></p>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="13" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Technical Excellence: Thorough investigations and sound conclusions under pressure</span><span data-ccp-props="{"335559739":200}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="13" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Communication: Exceptional written and verbal English for global coordination and documentation</span><span data-ccp-props="{"335559739":200}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="13" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Critical Thinking: Synthesizes information from multiple sources; identifies complex attack patterns</span><span data-ccp-props="{"335559739":200}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="13" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-aria-posinset="4" data-aria-level="1"><span data-contrast="auto">Self-Direction: Works independently with sound judgment on when to escalate</span><span data-ccp-props="{"335559739":200}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="13" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-aria-posinset="5" data-aria-level="1"><span data-contrast="auto">Collaboration: Partners effectively across teams, time zones, and cultures</span><span data-ccp-props="{"335559739":200}"> </span></li>
</ul>
<p><em><span data-contrast="auto">REPORTING STRUCTURE</span></em><span data-ccp-props="{"335559739":200}"> </span></p>
<p><span data-contrast="auto">Direct Reporting: Senior Manager, Security Operations</span><span data-ccp-props="{"335559739":200}"> </span></p>
<p><em><span data-contrast="auto">WORKING CONDITIONS</span></em><span data-ccp-props="{"335559739":200}"> </span></p>
<p><span data-contrast="auto">This position operates within a 24/7 global Security Operations Center environment based in India, providing coverage that overlaps with US East Coast, US West Coast, and European security teams. Standard working hours align with India business hours (9:00 AM to 6:00 PM IST) with flexibility required for incident response, global team coordination, and critical maintenance activities. The analyst must be available for on-call rotation to support after-hours critical incidents.</span><span data-ccp-props="{"335559739":200}"> </span></p>
<p><em><span data-contrast="auto">New hires will receive structured onboarding including training and shadowing to learn our specific environment, tooling, and operational procedures.</span></em><span data-ccp-props="{"335559739":200}"> </span></p>
<p><em><span data-contrast="auto">This job description conveys information essential to understanding the scope of the position and is not an exhaustive list of skills, efforts, duties, responsibilities, or working conditions associated with it. Management reserves the right to modify, add, or remove duties as necessary.</span></em><span data-ccp-props="{"335559739":200}"> </span></p>
<p><span data-ccp-props="{"335559739":200}"> </span></p>
<p><span data-ccp-props="{"335559739":200}"> </span></p><div class="content-conclusion"><p>We welcome talent at all career stages and are dedicated to understanding and supporting additional needs. We're proud to be an equal opportunity employer, committed to creating an inclusive and open environment for everyone.</p></div>