<?xml version="1.0" encoding="UTF-8"?>
<source>
  <jobs>
    <job>
      <externalid>55d2bc34-fc1</externalid>
      <Title>CyberSecurity Engineer, SOC Analyst</Title>
      <Description><![CDATA[<p>About Mistral AI
At Mistral AI, we believe in the power of AI to simplify tasks, save time, and enhance learning and creativity. Our technology is designed to integrate seamlessly into daily working life.</p>
<p>Role Summary
Mistral AI is looking for a Security Operations Center (SOC) Analyst to monitor, defend and respond to threats across our rapidly evolving AI ecosystem. You will treat security telemetry as the core of our active defense. Your objective is to ensure the continuous security of our diverse environment, spanning IT, Engineering, Science, Compute and Infrastructure by building robust detection mechanisms and moving swiftly from alert to automated response.</p>
<p>Responsibilities
• Partner with engineering and platform teams to ensure the comprehensive centralization of security logs across all Mistral environments.
• Design, test, and continuously tune high-fidelity alert scenarios and correlation rules to detect anomalous behavior while minimizing alert fatigue.
• Operationalize Cyber Threat Intelligence (CTI), monitoring the landscape for threats specific to AI and cloud infrastructure, and integrating actionable intel directly into our detection pipelines.
• Conduct rigorous, deep-dive investigations into security alerts, tracking root causes, identifying potential lateral movement, and determining impact.
• Drive the lifecycle of security incidents from containment to remediation, and coordinate cross-functional crisis management during high-severity events.</p>
<p>About You
• 3+ years of experience in a Security Operations Center (SOC), Incident Response, or Threat Hunting role, ideally within a cloud-native or fast-paced tech environment.
• Deep understanding of the threat landscape, the MITRE ATT&amp;CK framework, and the methodologies required to protect high-value infrastructure and intellectual property.
• Strong experience writing complex queries (e.g., KQL, Splunk SPL, or similar) and leveraging SIEM platforms to build out correlation rules and detection logic.
• Ability to write practical automation scripts in Python or Go to interact with security APIs, enrich alert context, and streamline response workflows.
• Proven experience participating in or leading incident response efforts, demonstrating a calm, methodical approach to high-pressure crisis management.</p>
<p>Hiring Process
• Introduction call - 30 min
• Hiring Manager interview - 30 min
• Technical Rounds - Dee-Dive interview - 55 min - Panel interview - 1h15
• Culture-fit discussion - 30 min
• References</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>onsite</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>Security Operations Center (SOC), Incident Response, Threat Hunting, KQL, Splunk SPL, SIEM platforms, Python, Go, security APIs, alert context, response workflows</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Mistral AI</Employername>
      <Employerlogo>https://logos.yubhub.co/mistral.ai.png</Employerlogo>
      <Employerdescription>Mistral AI is an AI company that provides high-performance, optimized, open-source and cutting-edge models, products and solutions. Its comprehensive AI platform meets enterprise needs, whether on-premises or in cloud environments.</Employerdescription>
      <Employerwebsite>https://mistral.ai</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://jobs.lever.co/mistral/f9782b09-ca3c-4bfc-ba7a-349551ef9a82</Applyto>
      <Location>Paris</Location>
      <Country></Country>
      <Postedate>2026-04-17</Postedate>
    </job>
    <job>
      <externalid>b313e462-e65</externalid>
      <Title>Security Operations Engineer - Engine by Starling</Title>
      <Description><![CDATA[<p>At Engine by Starling, we are on a mission to find and work with leading banks all around the world who have the ambition to build rapid growth businesses, on our technology.</p>
<p>Engine is Starling&#39;s software-as-a-service (SaaS) business, the technology that was built to power Starling, and two years ago we split out as a separate business. Starling has seen exceptional growth and success, and a large part of that is down to the fact that we have built our own modern technology from the ground up.</p>
<p>This SaaS technology platform is now available to banks and financial institutions all around the world, enabling them to benefit from the innovative digital features, and efficient back-office processes that has helped achieve Starling&#39;s success.</p>
<p>As a company, everyone is expected to roll up their sleeves to help deliver great outcomes for our clients. We are an engineering led company and we’re looking for people who are will be excited by the potential for Engine’s technology to transform banking in different markets around the world.</p>
<p>Our purpose is underpinned by five values: Listen, Keep It Simple, Do The Right Thing, Own It, and Aim For Greatness.</p>
<p>Hybrid Working We have a Hybrid approach to working here at Engine - our preference is that you&#39;re located within a commutable distance of one of our offices so that we&#39;re able to interact and collaborate in person.</p>
<p>About the Role To support our growth, we are looking for talented and motivated SOC engineers to join our foundational in-house SOC team.</p>
<p>In this pivotal role, you will be instrumental in supporting the development, implementation, and operating of our security monitoring, detection, and response capabilities, with a particular focus on our cloud environments.</p>
<p>You&#39;ll be at the forefront of responding to incidents and alerts, and helping shape the future of our security operations capabilities.</p>
<p>What you&#39;ll get to do:</p>
<p>Security Monitoring &amp; Alert Triage: Monitor security alerts and events generated by various security tools, perform triage and analysis of security incidents and anomalies, distinguishing between true positives and false positives.</p>
<p>Prioritise alerts based on severity, potential impact, and business criticality.</p>
<p>Incident Detection &amp; Response: Investigate security incidents thoroughly, leveraging logs from platforms, endpoints, applications, and other security tools.</p>
<p>Create and follow incident response playbooks and contribute to their continuous improvement.</p>
<p>Collaborate with Technology, Product and Engineering Teams to contain, eradicate, and recover from security incidents.</p>
<p>Document incident details, findings, and remediation steps accurately and comprehensively.</p>
<p>Additionally:</p>
<p>Stay informed about the latest cyber threats, attack techniques, and vulnerabilities, especially those targeting cloud environments.</p>
<p>Participate in proactive threat hunting activities using available tools and data sources.</p>
<p>Contribute to the optimisation, tuning, and maintenance of SOC tools.</p>
<p>Identify opportunities for automation to streamline security operations and enhance detection capabilities.</p>
<p>Maintain detailed records of security incidents, investigations, and remediation actions.</p>
<p>Requirements:</p>
<p>3+ years of hands-on experience in a Security Operations Center (SOC) or similar cybersecurity role.</p>
<p>Demonstrable experience with cloud security monitoring and incident response.</p>
<p>Familiarity with various attack vectors, threat intelligence frameworks (e.g., MITRE ATT&amp;CK).</p>
<p>A cyber/information security related degree and/or relevant cybersecurity qualifications would be beneficial e.g. CompTIA Security+, (ISC)² SSCP or CySA+</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>mid</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>Cloud security monitoring, Incident response, Threat intelligence, Attack vectors, Cybersecurity, Security operations center, SOC</Skills>
      <Category>Engineering</Category>
      <Industry>Finance</Industry>
      <Employername>Engine by Starling</Employername>
      <Employerlogo>https://logos.yubhub.co/starlingbank.com.png</Employerlogo>
      <Employerdescription>Engine by Starling is a software-as-a-service (SaaS) business that provides technology to banks and financial institutions.</Employerdescription>
      <Employerwebsite>https://www.starlingbank.com/engine/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://apply.workable.com/j/BDF61CB32E</Applyto>
      <Location>Cardiff</Location>
      <Country></Country>
      <Postedate>2026-03-20</Postedate>
    </job>
  </jobs>
</source>