Security Analyst Remote Jobs

13 Results

7d

Analyst 4, IT Security

Western DigitalBangalore, India, Remote
mobileazurepython

Western Digital is hiring a Remote Analyst 4, IT Security

Job Description

Responsibilities

  • DUO MFA Management:
    • Administer and manage the DUO Multi-Factor Authentication (MFA) platform.
    • Implement and enforce MFA policies across the organization, ensuring integration with various applications and systems.
    • Monitor MFA performance, troubleshoot issues, and handle escalations related to authentication failures or policy violations.
  • Microsoft Information Protection (MIP) Implementation:
    • Configure and maintain Microsoft Information Protection (MIP) policies to safeguard sensitive data.
    • Collaborate with the security and compliance teams to establish data classification and labeling policies based on organizational requirements.
    • Conduct regular audits and reviews of MIP policy adherence, ensuring that sensitive information is adequately protected.
  • Key Management Services (KMS):
    • Manage Key Management Services (KMS) for encryption key lifecycle, ensuring proper distribution and rotation of keys for critical systems.
    • Ensure KMS compliance with encryption and security best practices, maintaining availability and integrity of key materials.
  • Mobile Device Management (MDM) (Secondary Focus):
    • Support the administration and monitoring of MDM solutions to manage device security, app deployment, and access policies.
    • Work with IT teams to ensure all mobile devices comply with organizational security policies and access controls.
  • Active Directory (AD) and Azure AD (Entra ID) (Secondary Focus):
    • Provide support for Active Directory, managing user accounts, group policies, and organizational units.
    • Assist with synchronization between on-premises AD and Azure AD using Azure AD Connect, ensuring seamless hybrid identity integration.
    • Troubleshoot and resolve issues related to AD/AAD authentication and access provisioning.
  • IAM Process Optimization:
    • Continuously evaluate and improve IAM processes related to MFA, MIP, and KMS to enhance security and user experience.
    • Automate routine identity management tasks and workflows to increase efficiency and reduce manual errors.

 

 

  • Incident Response and Troubleshooting:
    • Act as the technical escalation point for identity-related incidents involving DUO MFA, MIP, KMS, and other IAM systems.
    • Investigate, troubleshoot, and resolve IAM issues, working closely with other teams to identify root causes and implement solutions.
  • Compliance and Reporting:
    • Ensure IAM solutions meet compliance requirements such as SOX, ETC.
    • Generate reports for auditing purposes and provide insights into the security posture of identity systems.
  • Collaboration and Documentation:
    • Collaborate with security, IT, and compliance teams to define and implement identity governance frameworks.
    • Develop and maintain comprehensive documentation for all IAM solutions, policies, and procedures.
  • Training and Knowledge Sharing:
    • Provide training to end-users and technical staff on IAM best practices, focusing on MFA, MIP, and encryption.
    • Stay up-to-date with industry trends and emerging technologies to continuously enhance the organization’s IAM capabilities.

 

Professional Attributes

  • Leadership: Demonstrated ability to assist in leading cross-functional teams and manage technical resources, driving projects and solutions to successful completion.
  • Problem-Solving: Strong analytical and troubleshooting skills with a proactive approach to identifying and resolving issues within complex identity and directory environments.
  • Analytical Skills: Ability to analyze complex IAM issues and apply logical troubleshooting techniques to resolve identity-related problems.
  • Attention to Detail: High accuracy and attention to detail in managing identity policies, systems configurations, and security protocols.
  • Communication: Strong communication skills to collaborate with technical and non-technical stakeholders across the organization.
  • Team Player: Ability to work effectively as part of a cross-functional team, with a focus on supporting the broader IAM strategy.
  • Customer Focused: Demonstrated ability to deliver excellent service to internal and external stakeholders, focusing on user experience without compromising security.

Adaptability: Ability to quickly learn and adapt to new tools, technologies, and security practices in a dynamic IT environment.

Qualifications

Technical Experience Required

  • DUO Multi-Factor Authentication (MFA):
    • Experience in administering and managing DUO MFA or similar authentication platforms.
    • Ability to configure, enforce, and troubleshoot MFA policies across diverse applications and systems.
  • Microsoft Information Protection (MIP):
    • Hands-on experience with MIP, including policy configuration, data classification, and labeling.
    • Understanding of data protection frameworks and the ability to map them to MIP policies.
  • Key Management Services (KMS):
    • Proficient in managing KMS for encryption key lifecycle management, including key rotation, storage, and compliance.
    • Strong understanding of encryption protocols and key management best practices.
  • Mobile Device Management (MDM):
    • Knowledge of MDM platforms and their integration with IAM systems for device security and policy enforcement.
    • Experience managing mobile devices in an enterprise setting, focusing on compliance and access control.
  • Active Directory (AD) and Azure AD (Entra ID):
    • Experience managing user accounts, group policies, and organizational units in Active Directory.
    • Familiarity with hybrid identity environments using Azure AD and Azure AD Connect for synchronization between on-prem and cloud identities.
  • PowerShell Scripting:
    • Basic PowerShell scripting skills to automate tasks related to identity management, such as user provisioning, reporting, and troubleshooting.
  • SIEM and Auditing Tools:
    • Familiarity with security information and event management (SIEM) tools for monitoring identity-related logs and events.
    • Experience generating audit reports for compliance purposes.

Programming and Tools

  • Scripting and Programming Languages:
    • PowerShell:Proficiency in using PowerShell to automate identity tasks, generate reports, and troubleshoot issues.
    • Python (optional):Familiarity with Python for advanced IAM automation and integration tasks.
  • IAM and Directory Tools:
    • DUO MFA:Expertise in configuring and maintaining DUO MFA for secure authentication.
    • Azure AD Connect:Experience with synchronization between on-prem AD and Azure AD for seamless hybrid identity management.
    • Microsoft Information Protection (MIP):Strong knowledge of MIP tools for implementing data protection policies.
  • Encryption and Key Management Tools:
    • Experience with KMS solutions for managing encryption keys and ensuring compliance with security standards
  • MDM Platforms:
    • Experience with leading MDM tools such as Microsoft Intune, MobileIron, or AirWatch for mobile device management and security.
  • Monitoring and Logging:
    • Familiarity with SIEM platforms (e.g., Splunk, Microsoft Sentinel) for monitoring and auditing identity events and security logs.
  • Career and Education Experience
    • Experience:
      • 6+ years of experience in IT or Information Security, with a focus on identity and access management.
      • 3+ years of direct experience working with DUO MFA, Microsoft Information Protection (MIP), and Key Management Services (KMS).
      • Experience with Mobile Device Management (MDM) platforms, Active Directory, and Azure AD (Entra ID).
    • Education:
      • BA or BS in Information Technology, Computer Science, Information Security, or a related field. Equivalent hands-on experience in IAM may be considered in lieu of a degree.
      • Relevant certifications such as Microsoft Certified: Identity and Access Administrator, Certified Information Systems Security Professional (CISSP), or DUO Security Administrator are desirable.

See more jobs at Western Digital

Apply for this job

Synack is hiring a Remote Security Analyst (Part-Time, Temporary)

Job Application for Security Analyst (Part-Time, Temporary) at Synack{"@context":"schema.org","@type":"JobPosting","hiringOrganization":{"@type":"Organization","name":"Synack"},"title":"Security Analyst (Part-Time, Temporary)","datePosted":"2024-12-12","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"San Mateo, California, United States","addressRegion":"CA","addressCountry":null,"postalCode":null}},"description":"\u003cp\u003eSynack’s Penetration Testing as a Service platform manages customers’ attack surfaces by discovering new assets, pentesting for critical vulnerabilities and gaining visibility into the root causes of security risks. We are committed to making the world more secure by harnessing a talented, vetted community of security researchers to deliver continuous penetration testing and vulnerability management, with actionable results. Synack's PTaaS platform has uncovered more than 71,000 exploitable vulnerabilities to date, protecting a growing list of Global 2000 customers and U.S. agencies in a FedRAMP Moderate Authorized environment. For more information, please visit\u0026nbsp;\u003cstrong data-stringify-type=\"bold\"\u003e\u003ca class=\"c-link\" href=\"http://www.synack.com/\" target=\"_blank\" data-stringify-link=\"http://www.synack.com\" data-sk=\"tooltip_parent\"\u003ewww.synack.com\u003c/a\u003e\u003c/strong\u003e.\u003c/p\u003e\n\u003cp\u003eAs the demand for cybersecurity grows, so does Synack’s Vulnerability Operations team! If you are pursuing a career in cybersecurity, specifically in offensive security, we encourage you to apply for our internship. \u003cstrong\u003eThis is a part-time, temporary position lasting 6 months.\u003c/strong\u003e\u003c/p\u003e\n\u003cp\u003e\u003cspan style=\"font-weight: 400;\"\u003eSounds interesting? Keep reading...\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eHere’s what you'll do\u003c/strong\u003e\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eAssist the Vulnerability Operations team with the review and acceptance of Missions, Patch Verifications, and vulnerability reports,\u003c/li\u003e\n\u003cli\u003eBypass customer patch attempts, create suspected vulnerability reports, and exploit real world vulnerabilities\u003c/li\u003e\n\u003cli\u003eWork remotely with seasoned Computer Security Analysts\u003c/li\u003e\n\u003cli\u003eLearn what it's like to review complex vulnerability reports\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003e\u003cstrong\u003eHere's what you'll need\u003c/strong\u003e\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eStrong written and verbal communication skills\u003c/li\u003e\n\u003cli\u003eBasic understanding of various Computer Security topics, particularly offensive cyber subjects\u003c/li\u003e\n\u003cli\u003eCourse work in offensive security (not necessarily at a University), hackathons, CTF participation, and any of the following lab/live testing:\u003c/li\u003e\n\u003cul\u003e\n\u003cli\u003ePortswigger Academy\u003c/li\u003e\n\u003cli\u003eHackTheBox.eu\u003c/li\u003e\n\u003cli\u003eTryHackMe\u003c/li\u003e\n\u003cli\u003eOr any other Offensive Security Lab platform\u003c/li\u003e\n\u003c/ul\u003e\n\u003cli\u003eOperational, hands-on knowledge of web application vulnerabilities and how to exploit them via Labs, CTFs, certifications, or prior work experience is not required but highly recommended\u003c/li\u003e\n\u003cli\u003eA clear understanding of the OSI model, TCP/IP, and CVSS Scoring\u003c/li\u003e\n\u003cli\u003eCoursework and/or lab work towards obtaining CEH, GPEN, EJPT, OSCP a plus\u003c

See more jobs at Synack

Apply for this job

12d

Sr. Security Analyst

AddeparRemote, UK
mobilec++

Addepar is hiring a Remote Sr. Security Analyst

Who We Are

Addepar is a global technology and data company that helps investment professionals provide the most informed, precise guidance for their clients. Hundreds of thousands of users have entrusted Addepar to empower smarter investment decisions and better advice over the last decade. With client presence in more than 45 countries, Addepar’s platform aggregates portfolio, market and client data for over $6 trillion in assets. Addepar’s open platform integrates with more than 100 software, data and services partners to deliver a complete solution for a wide range of firms and use cases. Addepar embraces a global flexible workforce model with offices in Silicon Valley, New York City, Salt Lake City, Chicago, London, Edinburgh and Pune.

The Role

We are currently seeking a Senior Information Security Analyst to join our Information Security & Riskteam.The successful candidate will have the opportunity to help take Addepar’s Security and Risk Program to the next level. In this role, this person will work as part of the Security Operations function to investigate security alerts, develop new monitoring strategies, and work with the wider business to increase the overall security posture of the organisation.

We are looking for someone with prior SOC experience who is a self-starter, takes ownership of their work, and is a believer in collaborative teamwork! This role is responsible for continuing to advance the buildout of Addepar’s SOC and incident response functions, interfacing closely with our MDR provider, maintaining and improving our SIEM platform, and acting as incident commander for security-related incidents.

What You’ll Do

  • Respond to security alerts and run threat hunting exercises.
  • Help develop security alerts with our existing toolset and develop security-centric IR processes and runbooks.
  • Take part in Addepar’s security on-call rotation, act as incident commander during Security Incidents, and lead regular incident postmortem exercises.
  • Lead triage work during major incidents and validate incident occurrences to identify Security-related risks.
  • Conduct post-incident reviews and analysis of alerts and monitoring to identify areas for improvement and implement necessary changes.
  • Identify recurring issues and patterns to proactively prevent future problems and enhance system security.

Who You Are

  • 4+ years of security incident response and investigation experience.
  • Bachelor’s degree or higher. Computer Science or Engineering related education preferred.
  • Experience with investigating using a wide variety of detective technologies such as SIEM, SOAR, packet capture analysis, host forensics and memory analysis tools.
  • Proficient in one or more programming languages, including at least one scripting language.
  • Ability to build strong relationships and work collaboratively with internal and external partners.
  • Excellent verbal and written communication and organisational skills, along with the ability to deliver to time-sensitive guidelines.
  • Certifications in Incident Response, Forensics, and Cloud Security are a major plus.
  • Curious, always learning and deeply interested in cybersecurity.
  • Self-starter with proactive problem solving skills

Our Values 

  • Act Like an Owner -Think and operate with intention, purpose and care. Own outcomes.
  • Build Together -Collaborate to unlock the best solutions. Deliver lasting value. 
  • Champion Our Clients -Exceed client expectations. Our clients’ success is our success. 
  • Drive Innovation -Be bold and unconstrained in problem solving. Transform the industry. 
  • Embrace Learning -Engage our community to broaden our perspective. Bring a growth mindset. 

In addition to our core values, Addepar is proud to be an equal opportunity employer. We seek to bring together diverse ideas, experiences, skill sets, perspectives, backgrounds and identities to drive innovative solutions. We commit to promoting a welcoming environment where inclusion and belonging are held as a shared responsibility.

We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform essential job functions, and to receive other benefits and privileges of employment. Please contact us to request accommodation.

PHISHING SCAM WARNING: Addepar is among several companies recently made aware of a phishing scam involving con artists posing as hiring managers recruiting via email, text and social media. The imposters are creating misleading email accounts, conducting remote “interviews,” and making fake job offers in order to collect personal and financial information from unsuspecting individuals. Please be aware that no job offers will be made from Addepar without a formal interview process. Additionally, Addepar will not ask you to purchase equipment or supplies as part of your onboarding process. If you have any questions, please reach out to TAinfo@addepar.com.

See more jobs at Addepar

Apply for this job

15d

Security Analyst

ConsensysUNITED STATES - Remote

Consensys is hiring a Remote Security Analyst

Job Application for Security Analyst at Consensys{"@context":"schema.org","@type":"JobPosting","hiringOrganization":{"@type":"Organization","name":"Consensys","logo":"https://recruiting.cdn.greenhouse.io/external_greenhouse_job_boards/logos/000/008/223/resized/Screenshot_2024-08-28_at_15.10.13.png?1724854279"},"title":"Security Analyst","datePosted":"2024-11-26","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":null,"addressRegion":null,"addressCountry":null,"postalCode":null}},"description":"\u003cp\u003e\u003cstrong\u003eUS or Remote (non-EU*, non-Australia, non-Canada)\u003c/strong\u003e\u003c/p\u003e\n\u003cp\u003eConsensys is the leading blockchain and web3 software company founded by Joe Lubin, CEO of Consensys and Co-Founder of Ethereum. Since 2014, Consensys has been at the forefront of innovation, pioneering technological developments within the web3 ecosystem.\u003c/p\u003e\n\u003cp\u003eThrough our product suite, including the MetaMask platform, Infura, Linea, Diligence, and our NFT toolkit Phosphor, we have become the trusted collaborator for users, creators, and developers on their path to build and belong in the world they want to see.\u003c/p\u003e\n\u003cp\u003eWhether building a dapp, an NFT collection, a portfolio, or a better future, the instinct to build is universal. Consensys inspires and champions the builder instinct in everyone by making web3 universally easy to use and develop on.\u003c/p\u003e\n\u003cp\u003eOur mission is to unlock the collaborative power of communities by making the decentralized web universally easy to access, use, and build on.\u0026nbsp;\u003c/p\u003e\n\u003cp\u003eYou’ll get to work on the tools, infrastructure, and apps that scale these platforms to onboard one billion participants and 5 million developers. You&rs

See more jobs at Consensys

Apply for this job

+30d

IT Security Analyst

NorgineHarefield,England,United Kingdom, Remote Hybrid

Norgine is hiring a Remote IT Security Analyst

Want a 3D Career? Join Norgine.

At Norgine, our colleagues Dare themselves to be different and try new things, Drive to achieve their goals and beyond, and Develop themselves and their community.

We call it the 3D career at Norgine and it offers you a fully-rounded experience with no limits.

Bring everything about yourself that you’re proud of, whether that’s your passion for making a difference, focus on others’ well-being, or intellectual curiosity to unleash in a fast-paced environment and supportive community.

In return, get a sense of belonging, a long-term career with ongoing development and upskilling, and a company that cares about people’s wellness as much as you do.

Because at Norgine, we transform lives with innovative healthcare solutions.

We have an exciting opportunity for a IT Security Analyst to join Norgine.

The person holding this position will report to Director of IT Governance.

If you want a multi-dimensional 3D career in a leading healthcare organisation, join us.

• Collate and share security Key Performance Indicator (KPI)/metrics data with the business to ensure transparent communication and alignment with agreed security goals.

• Conduct thorough technical security reviews of both new and existing services, documenting findings, and implementing necessary measures to ensure they meet the requirements as set out by the security team at Norgine.

• Assist as part of the wider team, the response and recovery of data and assets in the event of a cyber breach. Leading the thought process behind incident management solutions with internal stakeholders and external partners.

• Assist in the management of the security requirements of the supply chain through the technical analysis of systems and applications within Norgine

• Oversee the effectiveness and deployment of cyber security tools and technologies on a regular basis to ensure optimal performance and responsiveness.

• Understand and advise on the current and emerging Cyber Security legal/compliance measures which Norgine need to adhere to, relevant to where the business operates. Identify opportunities for improvement to be aligned with emerging legislation.

• Collaborate with the Security team to engage and lead projects with external partners and internal stakeholders to conduct penetration tests, interpret results, and develop response plans to address identified vulnerabilities.

• Oversight of the analysis of legacy operating systems and services, identifying potential security risks, and work with relevant stakeholders to implement security hardening or network isolation solutions where necessary.

• Participation in the internal and external security audits to ensure that there is the compliance to the required security and associated data protection standards.

• Monitor and assess the patch status of IT assets to ensure compliance and minimize vulnerabilities.

• Review and test the applicability of the security policies, processes, and controls to ensure their effectiveness within the business and alignment with best practices.

• Act as a subject matter expert, providing guidance and support to internal project delivery pipeline, BAU initiatives, and changes to ensure compliance with security policies and architectural principles.

• Maintain the Cyber Technology roadmap, working with the Technology team to research and propose innovative solutions to security challenges that may reduce Norgine’s risk and threat profile.

• Provides direction and input into the security incident response process, including supporting the development of new incident monitoring use cases, reviewing alerts generated by monitoring tools, and leading the coordination of security incidents.

• Provide assurance monitoring on standard, serviced and privileged access management, to ensure that the partners involved are efficient and effective in the delivery of this function.

• Engage in any other necessary activities that contribute to the organization's cyber security and risk mitigation efforts.

• Ensure compliance to Norgine policies and procedures at all times.

Our benefits may vary per location. Please liaise with the Norgine TA representative to obtain more information.

Sound good? Find out more about the career you’ll have with Norgine, then apply here.

 

#LI-PP1

See more jobs at Norgine

Apply for this job

Vectra is hiring a Remote Sr Security Analyst (US Remote)

Vectra® is the leader in AI-driven threat detection and response for hybrid and multi-cloud enterprises.

The Vectra AI Platform delivers integrated signal across public cloud, SaaS, identity, and data center networks in a single platform. Powered by patented Attack Signal Intelligence, it empowers security teams to rapidly prioritize, investigate and respond to the most advanced cyber-attacks. With 35 patents in AI-driven threat detection and the most vendor references in MITRE D3FEND, organizations worldwide rely on the Vectra AI to move at the speed and scale of hybrid attackers. For more information, visit www.vectra.ai. 

*Location: US-Remote (CONUS)

This position works on a 4x10, 2nd or 3rd shift

Position Overview

Vectra is seeking a highly skilled and experienced MDR (Managed Detection and Response) Security Analyst to join our team. As aSr Security Analyst, you will serve in a critical role in protecting and defending Vectra MDR customer infrastructure. You will be responsible for supervising and analyzing security events, responding to incidents, conducting SOC (Security Operations Center) operations, and assisting MDR customers to ensure their needs are met.

A successful candidate will have sound technical experience and skills, blended with good interpersonal, communication, and project management skills.

Responsibilities 

  • Monitor security logs and alerts from various sources, including intrusion detection systems, Endpoint Detection and Response (EDR) systems, and security information and event management (SIEM) tools. 
  • Investigate and analyze security incidents, identify root cause, and develop appropriate mitigation strategies.
  • Complete security response actions, including full remote remediation of endpoints.
  • Perform threat hunting and proactive analysis to identify potential security risks and vulnerabilities.
  • Collaborate with multi-functional teams, including product, engineering, and support, to resolve customer incidents or issues.
  • Mentor and provide guidance to junior security analysts, sharing knowledge and standard processes.
  • Conduct health checks and architecture reviews, providing technical expertise and real-life experience in creating solutions, designs, and recommendations.
  • Be a strong voice for your customers across business to identify new detection models, identify new product features, build content for both internal and external customer knowledge bases, and ensure successful Vectra deployments.
  • Travel expected 0-5%

Requirements

  • Demonstrable experience as an MDR security analyst, SOC analyst, or similar role in a fast-paced environment.
  • Experience providing remote response and remediation activities within networks and on endpoints.
  • Solid understanding of intrusion detection systems, artificial intelligence-based attack detection and prevention, incident response methodologies, and SOC operations.
  • Experience with SIEM tools, log analysis, network analysis, endpoint analysis, and threat intelligence platforms.
  • Solid knowledge of operating systems, networking protocols, and security technologies.
  • Proficient in incident handling, threat hunting, and forensics.
  • Excellent analytical and problem-solving skills, with the ability to think critically under pressure.
  • Good communication skills to effectively collaborate with multi-functional teams and communicate complex security issues to non-technical stakeholders.
  • Continuous learning attitude to stay updated with the evolving threat landscape and emerging security technologies.

Desirable

  • Prior experience with Vectra, SentinelOne, Microsoft Defender, or CrowdStrike
  • Coding experience in Bash, Python, or Powershell
  • Open-source development
Our competitive total rewards package includes cash compensation within the range provided below. Actual pay for this position may vary based on the hired candidate’s location, experience and relevant incumbent pay position.  
Vectra Total Rewards
$140,000$180,000 USD

Vectraprovides a comprehensive total rewards packagethatsupportsthefinancial,physical, mental and overall health ofour employeesand their families.Compensation includes competitive base pay, incentive plan eligibility, and participation in the employee equity plan (stock options).Specific benefitsofferedvariesby location, but commonly includehealth care insurance,income protection/ life insurance,access to retirementsavingsplans, behavioral &emotionalwellnessservices, generous time away from work,anda comprehensive employee recognition program.

Vectra is committed to creating a diverse environment and is proud to be an equal opportunity employer. 

We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status. 

 

See more jobs at Vectra

Apply for this job

+30d

Security Analyst II

ProArchBengaluru,Karnataka,India, Remote

ProArch is hiring a Remote Security Analyst II

ProArch is a global IT consulting firm providing Security, Data, Application Dev, and Cloud services. Offices are located in the US, UK and India.

 

As a Security Analyst II (SOC), you will be responsible for monitoring, detecting, and responding to security incidents while utilizing your expertise in M365 security technologies and Microsoft Sentinel to optimize detection and response capabilities. This role is highly technical. You will play a critical role in improving our security operations by creating and refining use cases and detection rules to safeguard our organization and clients from cyber threats. You will also be responsible for all the technical escalations from the junior SOC Analysts. You will have the Shift Lead responsibilities to ensure that the SOC Monitoring and Response is done with quality adhering to the defined SLAs and overlooking at the operations during your shift. Another goal would be to identify improvements and gaps within the SOC operations, creating standard operating procedures, creating workflows for playbooks that can be used by the SOC to respond to security incidents.

 

Communication skills are essential as this position will be the technical escalation point for the SOC Team. Security Analyst II (SOC) should be able to act proactively to ensure smooth security operations and effective collaboration during the shift. This position should lead by setting a good example and engaging the team to achieve the organizational goals set forth by the Leadership Team for the Security Teams. A key outcome of this position is to continuously improve the efficiency and quality of the security operations center.

  • Act as an escalation point for Tier 1 analysts, handling more complex security incidents and alerts.
  • Investigate, triage, and respond to security incidents detected through the SOAR / SIEM and other security monitoring tools.
  • Perform in-depth analysis of incidents and recommend containment and remediation actions.
  • Lead containment and remediation efforts for security incidents.
  • Develop, test, and fine-tune detection rules and use cases based on log sources, threat intelligence, attack patterns, and client requirements.
  • Identify emerging threats and incorporate them into use-cases for alerts and detections.
  • Optimize and refine alert thresholds and logic to minimize false positives and enhance detection accuracy.
  • Leverage expertise in Microsoft 365 Defender/Defender XDR, Microsoft Defender for Endpoint, Defender for Office 365 and Entra ID Protection to improve overall threat detection and response.
  • Conduct proactive threat hunting to identify unknown threats across endpoints, identities, and network traffic using available tools and log sources.
  • Analyze security logs and telemetry data for signs of compromise, anomalous activities, or malicious behavior.
  • Perform root-cause analysis for security incidents and provide actionable insights to improve security posture.
  • Prioritize the work effectively and handle shifting priorities professionally.
  • Work closely with cross-functional teams (IT, Cloud Operations, Application Development) to mitigate security risks and improve incident response capabilities.
  • Create detailed reports and post-incident analysis to communicate findings and recommendations to technical and non-technical stakeholders.
  • Contribute to continuous improvement of SOC processes, including SOPs, playbooks, runbooks, and escalation procedures.
  • Stay updated with the latest threat landscape, vulnerabilities, and attack methods.
  • Share knowledge and insights with other SOC analysts and participate in team knowledge-sharing sessions.
  • Participate in red/blue team exercises to test and improve detection and response capabilities.

TECHNICAL SKILLS:

Candidate should have a minimum of 4 years of experience in IT Security with additional background in Security Operations Center. To be successful, this position will require the candidate to have expertise in the following areas:

  • Strong knowledge of Microsoft Sentinel KQL (Kusto Query Language) for custom queries and rule creation.
  • Familiarity with Security Information and Event Management (SIEM) systems, particularly Microsoft Sentinel.
  • Familiarity of how SOAR (Security Orchestration and Automated Response) works and ability to provide workflows which can be used for automating SOC responses.
  • Experience with endpoint security, identity protection, and network security monitoring.
  • Perform forensic analysis to understand the scope and impact of incidents.
  • Incident Handling, take technical investigation ownership of incidents and coordinate response efforts.
  • Advanced Analysis, perform advanced and complex analysis of sophisticated threats.
  • Knowledge of security frameworks such as MITRE ATT&CK and CIS controls.
  • Industry knowledge and experience in Managed Detection and Response (MDR) technologies.
  • Experience working in a Managed Security Operations or Security Team
  • Knowledge of ITIL Foundation Framework.
  • Microsoft Security and Compliance including:
  1. Microsoft Purview, IRM, DLP, Insider Risk
  2. Defender for Endpoint
  3. Defender for Office 365
  4. Defender for Identity
  5. Defender for Cloud Apps
  6. Defender for Cloud
  7. Defender XDR
  8. Defender for IoT
  9. Entra ID Identity Protection
  10. Entra ID & Intune
  11. Microsoft Sentinel
  • Experience of CrowdStrike EDR and/or IDP is highly desirable.
  • Knowledge / Experience handling OT Security alerts is desirable.
  • Vulnerability Management tools including Qualys and Nucleus.
  • Security Awareness Training using tools such as KnowBe4.
  • Incident Response Management and Reporting.
  • Desirable to have knowledge of Compliance Frameworks including:
  1. NIST
  2. CMMC
  3. HIPAA
  4. NERC / CIP
  5. PCI
  6. Privacy such as GDPR and SHIELD

REQUIREMENTS:

This position requires that the applicant be a professional leader. ProArch is looking for a candidate who can fulfill the following:

  • Outstanding Written, Verbal, Technical, Non-Technical, communication & presentation skills.
  • Self-directed with the ability to prioritize and handle SOC Operations and Alert inflow.
  • Experience in mentoring and guiding a highly technical team.
  • Eager learner continually improving skill sets, earning certifications, and gaining industry knowledge.
  • Skilled in leading a conversation with client to drive an incident investigation and response.
  • Exceptional analytical skills
  • Outstanding written communication and verbal skills
  • 95% of our clients are from Northern USA. A good command over English language is a must.

 

EDUCATION AND CERTIFICATION:

  • Bachelor’s degree in computer science/engineering/IT/Computer Applications or significant demonstrable experience in IT Security / IT.
  • Must have any of these Microsoft Certifications: SC-200, SC-900, AZ-500, SC-300, SC-400.
  • Certifications such as CEH, CISSP, CompTIA CySA+, or others.

See more jobs at ProArch

Apply for this job

+30d

Security Analyst

UserTestingUK- Remote
Designc++

UserTesting is hiring a Remote Security Analyst

We’re UserTesting, a leader in experience research and insights; we believe the path to human understanding and great experiences start with a shared understanding—seeing and hearing how another person engages with the world around them and taking in their perspective. Working at UserTesting, you will be empowered to help organizations  discover the human side of business–transforming how they work, collaborate, innovate, and bring new products and experiences to market. This is what inspires us, and it’s how we enable companies to connect with their audiences naturally and organically through an experience that is uniquely, and intentionally human.

A trusted company by top brands for 15+ years, UserTesting, recently merged with UserZoom, has over 3,400 customers in 50 countries, including 75 of the Fortune 100 companies. Joining our team means being part of a passionate group focused on transforming how companies learn from and understand their customers. Come join us and help us build the engine for human understanding.

The Opportunity

As part of the Security Team, you will join a global Security Operations team, and contribute to UserTesting’s Corporate Security Framework from a technical and compliance perspective. 

  • Assist customers in understanding and evaluating UserTesting's security profile, both in writing and on calls.
  • Triage security alerts from security monitoring tools (AV, DLP, SOCaaS). 
  • Respond to security incidents and help keep track of post-incident tasks.
  • Participate in internal audits and support external audits.
  • Carry out third-party risk management assessments and risk reviews of external vendors. 
  • Identify and communicate current and emerging security threats.
  • Identify security gaps in existing and proposed technologies and recommend changes or enhancements.
  • Contribute to the design and implementation of enterprise-class security systems.
  • Demonstrates UserTesting’s values through work product and within day to day team interactions

What we're looking for

  • Competence and experience in 1-2 of the following areas:
    • Incident Response, Third Party Risk Management, Compliance, Vulnerability Management, Data Loss Prevention (DLP), Auditing, Privacy Operations, Identity Access Management, Customer Support
  • Candidates living in Ontario is strongly preferred 

Desirable but not required: 

  • Experience with Security frameworks such as NIST CSF, ISO 27001, SOC2
  • Experience developing and maintaining policies, procedures, standards and guidelines
  • Previous experience working with risk assessment methodologies
  • Experience ensuring applications are secure throughout the software development lifecycle


Compensation

Up to £40,000. 


Perks/Benefits

  • Private medical and dental
  • Monthly wellness and telecommunications reimbursements
  • Work from home office equipment stipend
  • Professional development stipend
  • Flexible hours
  • Generous holiday entitlement
  • Your Birthday off!
  • Mental Wellness Employee Assistance Program
  • Cycle to Work scheme 
  • Employee Referral Programme 
  • Paid quarterly volunteering days and Charity donation matching via our UT Cares Volunteers and Charitable Giving Committee
  • Enhanced family leave
  • Employee-led groups to help foster a more inclusive employee experience and build a culture of belonging at UserTesting. Read more here!

To learn more about our team, culture, and customers, check out ourcareers page,company blog, andpress/awards. Aside from a great work environment and the opportunity to make an impact, we’re also growing the team quickly–join us!

At UserTesting, we are committed to providing more inclusive and accessible experiences for our candidates. We pride ourselves on building empathy; diverse perspectives, which we believe are the key values to creating exceptional experiences for everyone. Our commitment to providing accessible experiences is driven by this belief and our core values. If you require any accommodations or have any specific requests about how we could tailor our interview process to better suit your needs please contact us on:talentexperience@usertesting.com.If you need to speak to someone please ask!

******

UserTesting is an Equal Opportunity Employer and a participant in the U.S. Federal E-Verify program.  Women, minorities, individuals with disabilities and protected veterans are encouraged to apply.  We welcome people of different backgrounds, experiences, abilities and perspectives.  

UserTesting will consider qualified applicants with criminal histories in a manner consistent with the San Francisco Fair Chance Ordinance, as applicable.  

We welcome candidates with physical, mental, and/or neurological disabilities. If you require assistance applying for an open position, or need accommodation during the recruiting process due to a disability, please submit a request to People Operations by emailingaskPeopleOps@usertesting.com.

See more jobs at UserTesting

Apply for this job

+30d

Sr. Security Analyst

agileBachelor's degree5 years of experienceazurec++linuxpythonAWS

hims & hers is hiring a Remote Sr. Security Analyst

Hims & Hers Health, Inc. (better known as Hims & Hers) is the leading health and wellness platform, on a mission to help the world feel great through the power of better health. We are revolutionizing telehealth for providers and their patients alike. Making personalized solutions accessible is of paramount importance to Hims & Hers and we are focused on continued innovation in this space. Hims & Hers offers nonprescription products and access to highly personalized prescription solutions for a variety of conditions related to mental health, sexual health, hair care, skincare, heart health, and more.

Hims & Hers is a public company, traded on the NYSE under the ticker symbol “HIMS”. To learn more about the brand and offerings, you can visit hims.com and forhers.com, or visit our investor site. For information on the company’s outstanding benefits, culture, and its talent-first flexible/remote work approach, see below and visit www.hims.com/careers-professionals.

About the Role:

We are seeking a Sr. Analyst, Security to help build our Security Operations discipline. Our team moves at a fast pace and always looking to help drive best security practices at our core. This dynamic team enables multiple areas of the business to be able to stay agile, but with always being vigilant to keep our infrastructure secure and drive innovation. This is an opportunity to directly drive change and security in our business.

You Will:

  • Advanced Security Monitoring and Analysis: Oversee the continuous monitoring and in-depth analysis of network traffic, system logs, and security alerts, employing cutting-edge SIEM solutions and leveraging advanced threat intelligence feeds to detect and respond to sophisticated cyber threats
  • Incident Response Mastery: Develop, refine, and lead the execution of advanced incident response plans and procedures, orchestrating multifaceted incident handling activities with a focus on rapid containment, eradication, and recovery. Serve as the ultimate technical authority during high-stress security incidents
  • Vulnerability Assessment and Management Expertise: Lead the identification and prioritization of vulnerabilities across our intricate technology stack, conducting comprehensive vulnerability assessments and overseeing advanced remediation efforts, including penetration testing and code review
  • AWS, Azure, and GCP Security Expertise: Utilize your extensive knowledge of AWS, Azure, and GCP security best practices to assess and enhance the security of cloud environments. Implement and maintain security configurations, identity and access controls, and encryption mechanisms specific to each cloud platform. Conduct security assessments and audits to identify vulnerabilities and provide recommendations for remediation
  • Pioneering Threat Intelligence Integration: Maintain an expert understanding of emerging cybersecurity threats and trends, actively integrating advanced threat intelligence into security operations to drive proactive threat detection and support the development of custom threat-hunting methodologies
  • Master of Security Automation and Tooling: Spearheaded the development and deployment of highly sophisticated scripts, automation tools, and custom security solutions to optimize and streamline complex security tasks, enhance operational efficiency, and enable rapid response to evolving threats
  • Prior experience with Threat Hunting and making recommendations on findings
  • Experience in Red team, Blue team, Purple team, and table top exercise
  • Recommend and implement security enhancements to proactively address emerging threats
  • Assist in the development and enforcement of security policies, standards, and procedures
  • Prior experience with industry regulations and standards, such as NIST, CIS, and GDPR

You Have:

  • Bachelor's degree in a relevant field or equivalent work experience
  • Minimum of 5 years of experience in a security analyst role
  • Experience with Python and Powershell scripting
  • Strong expertise in cloud computing, with a preference for AWS
  • Proficiency in Sumo Logic for creating Insights and Signals
  • Experience researching through logs for security investigations
  • Familiarity with security platforms such as Netskope, CrowdStrike, Tenable, Cisco Meraki, and Proofpoint, or similar products
  • Certifications such as OCSP, CompTIA Security+, Pentest+, or AWS Certified Security – a plus
  • Excellent problem-solving and analytical skills
  • Strong communication, documentation, and teamwork abilities
  • Ability to work independently and under pressure in a fast-paced environment
  • Exposure to penetration testing platforms such as Burp Suite, Kali Linux, Metasploit, Nexpose
  • Skilled with network security tools such as Palo Alto Firewalls, Cisco VPNs, Palo Alto IDS
  • Understanding of regulatory compliance (NIST CSF, SOX, ISO)

 

Our Benefits (there are more but here are some highlights):

  • Competitive salary & equity compensation for full-time roles
  • Unlimited PTO, company holidays, and quarterly mental health days
  • Comprehensive health benefits including medical, dental & vision, and parental leave
  • Employee Stock Purchase Program (ESPP)
  • Employee discounts on hims & hers & Apostrophe online products
  • 401k benefits with employer matching contribution
  • Offsite team retreats

 

#LI-Remote

 

Outlined below is a reasonable estimate of H&H’s compensation range for this role for US-based candidates. If you're based outside of the US, your recruiter will be able to provide you with an estimated salary range for your location.

The actual amount will take into account a range of factors that are considered in making compensation decisions, including but not limited to skill sets, experience and training, licensure and certifications, and location. H&H also offers a comprehensive Total Rewards package that may include an equity grant.

Consult with your Recruiter during any potential screening to determine a more targeted range based on location and job-related factors.

An estimate of the current salary range is
$110,000$120,000 USD

We are focused on building a diverse and inclusive workforce. If you’re excited about this role, but do not meet 100% of the qualifications listed above, we encourage you to apply.

Hims considers all qualified applicants for employment, including applicants with arrest or conviction records, in accordance with the San Francisco Fair Chance Ordinance, the Los Angeles County Fair Chance Ordinance, the California Fair Chance Act, and any similar state or local fair chance laws.

It is unlawful in Massachusetts to require or administer a lie detector test as a condition of employment or continued employment. An employer who violates this law shall be subject to criminal penalties and civil liability.

Hims & Hers is committed to providing reasonable accommodations for qualified individuals with disabilities and disabled veterans in our job application procedures. If you need assistance or an accommodation due to a disability, please contact us at accommodations@forhims.com and describe the needed accommodation. Your privacy is important to us, and any information you share will only be used for the legitimate purpose of considering your request for accommodation. Hims & Hers gives consideration to all qualified applicants without regard to any protected status, including disability. Please do not send resumes to this email address.

For our California-based applicants – Please see our California Employment Candidate Privacy Policy to learn more about how we collect, use, retain, and disclose Personal Information. 

See more jobs at hims & hers

Apply for this job

+30d

Security Analyst

Clover HealthRemote - Canada
remote-first

Clover Health is hiring a Remote Security Analyst

Clover is reinventing health insurance by working to keep people healthier.

We value diversity — in backgrounds and in experiences. Healthcare is a universal concern, and we need people from all backgrounds and swaths of life to help build the future of healthcare. Clover's engineering team is empathetic, caring, and supportive. We are deliberate and self-reflective about the kind of engineering team and culture that we are building, seeking engineers that are not only strong in their own aptitudes but care deeply about supporting each other's growth.

As a Security Analyst, you will forge and nurture trusted relationships with internal teams (Software Engineering, SRE, DS/ML, Product) and external customers (e.g., payers, accountable care organizations, integrated delivery networks, auditors). You will partner closely with the entire organization to develop policies and procedures, operationalize, train, and enable secure operations.  Theis ideal candidate for this role will understand the needs of data/information security and is eager to grow their career in the areas of operations, governance, risk and compliance.

As a Security Analyst, you will:

  • Operationalize, configure, and monitor security applications such as EDR, DLP, Vulnerability Management, and CSPM systems.
  • Assist with incident response activities, including tabletop exercises.
  • Support the implementation and maintenance of GRC frameworks.
  • Assist in internal risk assessments and audits to ensure adherence with security policies.
  • Serve as security point-of-contact for audit/certification programs such as HITRUST, SOC 2, and HIPAA.
  • Assess and improve systems for compliance with security requirements, policies, guidelines and standards (see above).
  • Interface with external customers on CA security reviews and assessments.
  • Participate in security awareness and training programs to promote security-first mindset across the organization.

You will love this job if:

  • You are passionate about transforming healthcare delivery through new technologies and want to make an impact.
  • You have a bias toward action and seek to intervene before issues arise.
  • You are comfortable navigating ambiguity and working in an evolving environment.
  • You are a problem solver and a team player. You love working within teams and helping them work more efficiently.
  • You are a strong communicator and able to influence behaviors to help drive desired outcomes.
  • You are empathetic and seek to build enduring relationships with our customers and users.
  • You are analytical and use data to drive actions and evaluate outcomes.

You should get in touch if:

  • You have 1+ years of experience in a security role with priority operations, risk and/or compliance.
  • You have good knowledge of cybersecurity frameworks and standards (e.g., NIST, ISO, CIS).
  • You have familiarity with security tools such as EDR, DLP, Vulnerability Management, and CSPM systems, 
  • You have familiarity with log analysis, SIEM systems and network traffic monitoring.
  • You have a good understanding of IAM/PAM concepts and tools.
  • You have the ability to write, review, and update security policies, and procedure documentation.
  • You have excellent written and verbal communication skills and are able to craft clear and comprehensive reports and research to present to engineering and other stakeholders.
  • You stay up-to-date with the latest research on threats, attack vectors, and security trends and are keen to apply them to our environment.

Benefits Overview:

  • Financial Well-Being: Our commitment to attracting and retaining top talent begins with a competitive base salary and equity opportunities. Additionally, we offer a performance-based bonus program and regular compensation reviews to recognize and reward exceptional contributions.
  • Physical Well-Being: We prioritize the health and well-being of our employees and their families by offering comprehensive group medical coverage that include coverage for hospitalization, outpatient care, optical services, and dental benefits.
  • Mental Well-Being: We understand the importance of mental health in fostering productivity and maintaining work-life balance. To support this, we offer initiatives such as No-Meeting Fridays, company holidays, access to mental health resources, and a generous annual leave policy. Additionally, we embrace a remote-first culture that supports collaboration and flexibility, allowing our team members to thrive from any location. 
  • Professional Development: We are committed to developing our talent professionally. We offer learning programs, mentorship, professional development funding, and regular performance feedback and reviews.

Additional Perks:

  • Reimbursement for office setup expenses
  • Flexibility to work from home or from our office, enabling collaboration with global teams
  • Paid parental leave for all new parents
  • And much more!

About Clover: We are reinventing health insurance by combining the power of data with human empathy to keep our members healthier. We believe the healthcare system is broken, so we've created custom software and analytics to empower our clinical staff to intervene and provide personalized care to the people who need it most.

We always put our members first, and our success as a team is measured by the quality of life of the people we serve. Those who work at Clover are passionate and mission-driven individuals with diverse areas of expertise, working together to solve the most complicated problem in the world: healthcare.

From Clover’s inception, Diversity & Inclusion have always been key to our success. We are an Equal Opportunity Employer and our employees are people with different strengths, experiences and backgrounds, who share a passion for improving people's lives. Diversity not only includes race and gender identity, but also age, disability status, veteran status, sexual orientation, religion and many other parts of one’s identity. All of our employee’s points of view are key to our success, and inclusion is everyone's responsibility.


#LI-REMOTE

See more jobs at Clover Health

Apply for this job

+30d

Security Analyst

Cohere HealthRemote
Bachelor's degreec++AWS

Cohere Health is hiring a Remote Security Analyst

Company Overview:

Cohere Health is a fast-growing clinical intelligence company that’s improving lives at scale by promoting the best patient-specific care options, using leading edge AI combined with deep clinical expertise. In only four years our solutions have been adopted by health insurance plans covering over 15 million people, while our revenues and company size have quadrupled.  That growth combined with capital raises totaling $106M positions us extremely well for continued success. Our awards include: 2023 and 2024 BuiltIn Best Place to Work, Top 5 LinkedIn™ Startup, TripleTree iAward, multiple KLAS Research Points of Light, along with recognition on Fierce Healthcare's Fierce 15 and CB Insights' Digital Health 150 lists.

Opportunity Overview:

We are seeking a skilled and experienced Security Analyst to join our cybersecurity team. The successful candidate will play a pivotal role in safeguarding our organization's digital assets by actively participating in incident response, leveraging managed detection and response (MDR) tools, and enhancing log management practices. The Security Analyst will work closely with our Managed Security Service Provider (MSSP) and internal teams to ensure robust security monitoring, efficient incident escalation, and proactive threat hunting.

Last but not least: People who succeed here are empathetic teammates who are candid, kind, caring, and embody our core values and principles. We believe that diverse, inclusive teams make the most impactful work. Cohere is deeply invested in ensuring that we have a supportive, growth-oriented environment that works for everyone.

What you will do:

  • Cloud Security Expertise:
    • Demonstrate advanced proficiency in cloud security, particularly within AWS environments.
    • Stay abreast of the latest AWS security services, tools, and best practices.
  • Incident Response:
    • Lead and manage the incident response process, including detection, analysis, containment, eradication, and recovery of security incidents.
    • Develop and maintain incident response playbooks, ensuring timely and effective handling of security incidents.
    • Conduct post-incident analysis and create detailed incident reports with recommendations for improving security posture.
  • Managed Detection and Response (MDR):
    • Utilize MDR tools to monitor security alerts, identify potential threats, and coordinate response efforts.
    • Analyze alerts generated by MDR tools, determine their severity, and take appropriate actions to mitigate threats.
    • Collaborate with MDR service providers to ensure optimal configuration and performance of security monitoring systems.
  • Log Enhancement and Management:
    • Enhance log management practices, including log collection, normalization, and correlation.
    • Develop and implement log retention and rotation policies to comply with industry standards and regulations.
    • Analyze logs to identify suspicious activities, anomalies, and potential security breaches.
  • Incident Escalation:
    • Act as the primary point of contact for Level 2 incident escalation and triage.
    • Assess and prioritize security incidents based on their impact and severity.
    • Coordinate with relevant teams and stakeholders to escalate incidents to higher levels of response when necessary.
  • Level 2 Alert Triage:
    • Perform in-depth analysis of security alerts and incidents, determining false positives and true positives.
    • Investigate and respond to Level 2 alerts, ensuring timely resolution and documentation.
    • Develop and maintain detailed records of all triaged alerts and actions taken.
  • Collaboration with Managed Security Service Provider (MSSP):
    • Collaborate closely with the MSSP to ensure seamless communication and coordination during security incidents.
    • Review and validate the quality of services provided by the MSSP, including threat detection and response capabilities.
    • Participate in regular meetings with the MSSP to discuss security trends, incident reports, and service improvements.
  • Alert Tuning and Optimization:
    • Continuously tune and optimize security alerts to reduce false positives and enhance detection accuracy.
    • Work with the security operations team to refine alert thresholds and improve the overall effectiveness of security monitoring.
  • Threat Hunting Exercises:
    • Proactively hunt for threats and vulnerabilities within the organization's environment.
    • Conduct threat intelligence research and analysis to identify emerging threats and attack vectors.
    • Develop and execute threat hunting exercises to identify and mitigate potential security risks.

Your background & requirements:

  • Bachelor's degree in Computer Science, Information Security, or a related field, or equivalent work experience.
  • 3+ years of experience in a security analyst role, with a focus on incident response, log management, and threat detection.
  • Strong knowledge of MDR tools, SIEM platforms, and security monitoring technologies.
  • Experience with incident response frameworks and best practices (e.g., MITRE - ATT&CK, MITRE D3FEND, NIST CSF, SANS).
  • Proficiency in analyzing security logs, alerts, and incidents.
  • Excellent problem-solving and analytical skills, with the ability to work under pressure.
  • Strong communication and collaboration skills, with the ability to work effectively with cross-functional teams and external partners.
  • Relevant certifications such as Security +, CEH, GCIH, or similar are preferred.

We can’t wait to learn more about you and meet you at Cohere Health!

Equal Opportunity Statement: 

Cohere Health is an Equal Opportunity Employer. We are committed to fostering an environment of mutual respect where equal employment opportunities are available to all.  To us, it’s personal.

The salary range for this position is $80,000 to $105,000; as part of a total benefits package which includes health insurance, 401k and bonus. In accordance with state applicable laws, Cohere is required to provide a reasonable estimate of the compensation range for this role. Individual pay decisions are ultimately based on a number of factors, including but not limited to qualifications for the role, experience level, skillset, and internal alignment.

 

#LI-Remote

#BI-Remote

Apply for this job

+30d

Senior Security Analyst

PindropUS - Remote
Lambdaremote-firstazurec++linuxpythonAWS

Pindrop is hiring a Remote Senior Security Analyst

Senior Security Analyst

US-Remote

Who we are

Are you passionate about innovating at the intersection of technology and personal security? At Pindrop, we recognize that the human voice is a unique personal identifier, increasingly susceptible to sophisticated fraud, including the threat of deepfakes. We're leading the way in developing cutting-edge authentication, fraud prevention, and deepfake detection. Our mission is to provide seamless and secure digital experiences, safeguarding the most personal aspect of our identity: our voice. Here, you'll be part of a team driven by values of Innovation, Customer Advocacy, Excellence, and Impact. We're not just creating a safer digital landscape by fortifying trust and integrity with those we serve, we’re also building a dynamic, supportive workplace where your contributions make a real difference.

Headquartered in Atlanta, GA, Pindrop is backed by world-class investors such as Andreessen-Horowitz, IVP, and CapitalG.

What you’ll do 

  • Represent security in internal and external meetings to discuss security analysis, findings and security/compliance responses. 
  • Review past incidents and identify attack trends. Finetune and reconfigure alerts based on prior incidents to improve detection.
  • Actively participate in the development, documentation, and implementation of new processes to expand and mature capabilities for the organization.
  • Identify and track internal and external assets to identify potential risks. Communicate these risks to internal and external stakeholders and build a plan of action.
  • Develop, update, and maintain a repository of cybersecurity threat information that may be used in conducting risk assessments and reports on cyber risk trends.
  • Build and maintain tools for automation of security events and reporting. Optimize and reconfigure tools to improve security processes.
  • Implement, maintain and monitor IDS/IPS rule sets, alerts and reports.
  • Perform investigations and improve detection processes on a wide variety of security events from various sources to determine whether they pose a threat to Pindrop
  • Identify, research and develop internal and open source tools used to improve security and threat intelligence workflows to support Pindrop's unique environment
  • Collaborate with internal and external teams to answer customer questionnaires, compliance audits.

Who you are

  • You are, hands-on problem solver that excels in dynamic fast paced environments, curious and always looking to learn., highly interested in how things work and gets excited by threat modeling and new exploits
  • You are resilient in the face of challenges, change, and ambiguity
  • You are optimistic and believe that you can make a problem into a solution
  • You are resourceful, excited to uncover innovative solutions and teach yourself something new when needed
  • You take accountability, do the things you say you’ll do, under-promise and over-deliver
  • You are nimble and adaptable when priorities change and continue to see the “forest through the trees” 
  • Part of On-call rotation with night/weekend work required

Your skill-set: 

  • 2+ years of security monitoring and incident response experience
  • Must have experience with Linux, Mac, and knowledge of Windows
  • Experience in configuration and maintenance of endpoint security solutions, eg. Crowdstrike, SentinelOne, Carbon Black.
  • Experience with security tools including SIEM, Metasploit, Splunk, Wireshark
  • In-depth knowledge of SIEM log ingestion and alert creation.
  • Hands-on experience with TCP/IP and networking
  • Ability to write scripts/code using Python or other scripting languages for automation
  • Knowledge of incident response and investigation tools and techniques
  • Experience with security operations in cloud platforms such as AWS, GCP, Azure etc.
  • Experience responding to security questionnaires and customer questions

Nice to have:

  • Experience with forensic analysis tools (commercial and open-source) and procedures desired
  • Experience with threat feeds and threat intelligence (e.g., STIX, TAXII, IOCs) desired
  • Experience with cloud logging applications, AWS Cloudtrail, VPC Flow Logs, Lambda, etc.

What’s in it for you:

As a Pindropper, you join a rapidly growing company making technology more human with the power of voice. You will work alongside some of the best and brightest. We’re a passionate group committed to excellence - but that doesn’t stop us from enjoying the journey as a team with chess and poker tournaments, catered lunches and happy hours, wellness programming, and more. Because we take our jobs seriously, we add in time for rest with Unlimited PTO, Focus Thursday, and Company-wide Rest Days.

Within 30 days:

  • You’ll focus on training and learning the basics of the company. This includes the company’s systems, procedures that should be adhered to, products and services, software, vendors, and/or clients.
  • You’ll have been introduced to your team, colleagues and have 1:1’s to assimilate into the company culture.
  • You will have the opportunity to learn the product in and out through training and a variety of resources. This then means that the majority of the things-to-do should fall along the lines of attending training sessions, gaining and mastering product knowledge, learning major corporate systems, meeting the members of your team, and getting the necessary access. 

Within 60 days:

  • You’ll have a good grasp of your working environment and you can now move onto more advanced tasks. 
  • You will start studying the best practices in the industry, create goals, meet up with your supervisor and get feedback on your performance, and build meaningful relationships with your co-workers along with taking on proper job responsibilities.  

Within 90 days

  • You’ll demonstrate a firm grasp of the company and confidence in your job function. Thus, you should be preparing to make breakthrough contributions to your team or department. 
  • The contributions may include finding new ways to improve security or coming up with ideas to save the company money. Instead of only identifying problems in the company, you should be at the forefront of brainstorming possible solutions. 
  • You will be able to spearhead new initiatives and collaborate with other teams for the good of the company. 

What we offer

As a part of Pindrop, you’ll have a direct impact on our growing list of products and the future of security in the voice-driven economy. We hire great people and take care of them. Here’s a snapshot of the benefits we offer:

  • Competitive compensation, including equity for all employees
  • Unlimited Paid Time Off (PTO)
  • 4 company-wide rest days in 2024 where the entire company rests and recharges!
  • Generous health and welfare plans to choose from - including one employer-paid “employee-only” plan!
  • Best-in-class Health Savings Account (HSA) employer contribution
  • Affordable vision and dental plans for you and your family
  • Employer-provided life and disability coverage with additional supplemental options
  • Paid Parental Leave - Equal for all parents, including birth, adoptive & foster parents
  • Identity protection through Norton LifeLock
  • One Time home office allowance
  • Remote first environment - meaning you have flexibility in your day!
  • Company holidays
  • Annual professional development and learning benefit
  • Pick your own Apple MacBook Pro
  • Retirement plan with competitive 401(k) match
  • Wellness Program including Employee Assistance Program, 24/7 Telemedicine

What we live by

At Pindrop, our Core Values are fundamental beliefs at the center of all we do. They are our guiding principles that dictate our actions and behaviors. Our Values are deeply embedded into our culture in big and small ways and even help us decide right from wrong when the path forward is unclear. At Pindrop, we believe in taking accountability to make decisions and act in a way that reflects who we are. We truly believe making decisions and acting with our Core Values in mind will help us to achieve our goals and keep Pindrop a great place to work:    

  • Audaciously Innovate - We continue to change the world, and the way people safely engage and interact with technology. As first principle thinkers, we challenge standards, take risks and learn from our mistakes in order to make positive change and continuous improvement. We believe nothing is impossible.
  • Evangelical Customers for Life - We delight, inspire and empower customers from day one and for life. We create a partnership and experience that results in a shared passion.   We are champions for our customers, and our customers become our champions, creating a universal commitment to one another. 
  • Execution Excellence - We do what we say and say what we do. We are accountable for making the tough decisions and necessary tradeoffs to deliver quality and effective solutions on time.
  • Win as a Company - Every time we win, we win as a company. Every time we lose, we lose as a company. We break down silos, support one another, embrace diversity and celebrate our successes. We are better together. 
  • Make a Difference - Every day we have the opportunity to make a positive impact. We operate with dedication, passion, and uncompromising integrity, creating a safer, more secure world.

Not sure if this is you?

We want a diverse, global team, with a broad range of experience and perspectives. If this job sounds great, but you’re not sure if you qualify, apply anyway! We carefully consider every application and will either move forward with you, find another team that might be a better fit, keep in touch for future opportunities, or thank you for your time.

Pindrop is an Equal Opportunity Employer

Here at Pindrop, it is our mission to create and maintain a diverse and inclusive work environment. As an equal opportunity employer, all qualified applicants receive consideration for employment without regard to race, color, age, religion, sex, gender, gender identity or expression, sexual orientation, national origin, genetic information, disability, marital and/or veteran status.

#LI-Remote

See more jobs at Pindrop

Apply for this job

TripActions is hiring a Remote Staff Security Analyst, Customer Trust

Job Application for Staff Security Analyst, Customer Trust at Navan

See more jobs at TripActions

Apply for this job