Source Job

$68,000–$68,000/yr
North America Europe Middle East APAC

  • Monitor and triage detection alerts and network telemetry generated by the Dragos Platform in customer environments.
  • Investigate suspicious activity and assist with identification of misconfigurations, anomalies, and potential malicious behaviors in OT networks.
  • Perform initial analysis, apply context, and escalate relevant findings to senior analysts and threat hunters with appropriate details and documentation.

Networking Cybersecurity Threat Hunting

20 jobs similar to Associate OT Security Analyst

Jobs ranked by similarity.

SOC Engineer II

IEM
US

  • Monitor, investigate, triage, and respond to security alerts.
  • Perform advanced network analysis and conduct log analysis.
  • Assist with EDR investigations and support the Incident Response Team.

Industrial Electric Mfg. (IEM) is the largest independent full-line manufacturer of custom power distribution systems in North America. With $1B+ in annual sales and 10,000+ commissioned projects across technology, data centers, commercial, energy, utilities, healthcare, industrial, and infrastructure markets, IEM continues to deliver exceptional product quality, dependable service, and the flexibility to meet complex technical requirements at scale.

US

Monitor and analyze security events using SIEM platforms. Investigate and respond to alerts from XDR tools. Conduct proactive threat hunting across endpoints, networks, and cloud environments.

Since 1996, Numerix has provided expertise, analytics and software that redefine pricing and risk management in the financial markets, strengthening its leadership position.

$20–$22/hr
Global

  • Monitor security alerts and events using SIEM and other monitoring tools.
  • Analyze and respond to security incidents, including malware infections, phishing attempts, and unauthorized access.
  • Triage and prioritize alerts based on severity and potential impact.

ATPCO is the world's primary source for air fare content, holding over 200 million fares across 160 countries. ATPCO believes in flexibility, trust, and a culture where your wellbeing comes first, offering open-door leadership and real-time recognition.

$64,938–$103,901/yr
US

  • Monitor alerts from security tools and work towards resolution.
  • Participate in incident response and perform incident reporting.
  • Collaborate with team members to develop SOC IR strategies.

CSG empowers companies to build unforgettable experiences, making it easier for people and businesses to connect with, use and pay for the services they value most. CSG's technologies and people have helped some of the world's most recognizable brands solve their toughest business challenges and evolve to meet the demands of today's digital economy.

$64,632–$96,948/yr
Europe

  • Help break down the barriers to cybersecurity.
  • Change the security game and make a real difference.
  • Protect businesses with enterprise-grade cybersecurity products.

Huntress is a fully remote, global team of passionate experts and ethical badasses on a mission to break down the barriers to cybersecurity. Founded in 2015 by former NSA cyber operators, Huntress protects all businesses with enterprise-grade, fully owned, and managed cybersecurity products. The company protects 3M+ endpoints and 1M+ identities worldwide, elevating underresourced IT teams with protection that works as hard as they do.

$93,500–$126,500/yr
US Unlimited PTO

  • Monitor SIEM alerts, triage incidents, and escalate as needed to ensure timely resolution
  • Conduct third-party and supply chain risk management reviews, including audit report analysis
  • Collaborate with engineering, IT, and operations teams to integrate and maintain security controls

Jobgether uses an AI-powered matching process to ensure your application is reviewed quickly, objectively, and fairly against the role's core requirements. It identifies top-fitting candidates and shares this shortlist with the hiring company.

$119,000–$127,000/yr
US

  • Using Red Canary’s detection platform to analyze EDR telemetry, alerts, and log sources.
  • Researching coverage opportunities then creating new detectors, and tune existing ones.
  • Improving the Detection Engineering workflow through orchestration & automation.

Zscaler accelerates digital transformation, protecting customers from cyberattacks and data loss. They value transparency and constructive debate, building high-performing teams focused on customer obsession, collaboration, ownership, and accountability.

Europe

  • Analyze cyber threats and produce actionable intelligence.
  • Support the development of detection capabilities.
  • Deliver technical briefings and executive-level summaries.

Jobgether uses an AI-powered matching process to ensure your application is reviewed quickly, objectively, and fairly against the role's core requirements.

$93,500–$126,500/yr
US Unlimited PTO

  • Advise tuning of SIEM correlation rules and use cases to identify security incidents and anomalies.
  • Monitor SIEM alerts, triage, and respond to security incidents in a timely manner, escalating as necessary to the appropriate team(s) for further investigation and remediation.
  • Perform Third Party/Supply Chain Risk Management reviews, to include security research and audit report analysis.

Defense Unicorns delivers mission value by streamlining software delivery so our customers can focus on the most important challenges. Our team is composed of innovators, software engineers, and veterans with decades of experience delivering technology programs across the federal market.

US

  • Lead incident response efforts for high-severity and complex security events.
  • Perform advanced threat analysis, including APT detection and analysis of threat actor tactics.
  • Lead continuous improvement initiatives for SOC processes, workflow automation, and detection coverage.

Brightspeed is providing fast, reliable internet connections and customer experience in twenty states throughout the Midwest and South. They are backed by funds managed by Apollo Global Management and are upgrading copper to fiber optic technologies.

Europe

  • Provide timely and actionable intelligence to support customer intelligence requirements
  • Collaborate with a global team of threat intelligence analysts to analyze and develop coverage for emerging threats
  • Develop tactical hunting and strategic threat assessments in support of customer needs

Palo Alto Networks' mission is to be the cybersecurity partner of choice, protecting our digital way of life with a vision for a safer, more secure world. They challenge and disrupt the status quo, seeking innovators committed to shaping the future of cybersecurity.

US

Investigate and analyze sophisticated cyber threats targeting cloud environments. Identify and track state-backed and financially motivated threat actors. Communicate findings to internal teams, customers, and the public, ensuring clarity and actionable insights.

This position is posted by Jobgether on behalf of a partner company and uses an AI-powered matching process to ensure quick and fair application reviews.

$83,200–$124,800/hr

  • Review detection alerts, triage workflows, and escalation pathways
  • Evaluate completeness, accuracy, and quality of incident response actions
  • Identify gaps in logging, detection coverage, and containment logic

Alignerr is a recruiting company. The job posting does not contain information about company size, employee count or culture.

Philippines

  • Monitor network performance and system alerts using various monitoring tools.
  • Respond to network incidents and outages, providing timely resolution to minimize downtime.
  • Perform routine network maintenance and updates to ensure system reliability and security.

HIKINEX is seeking a skilled and motivated NOC Technician to join their team. They are responsible for monitoring and maintaining clients' network infrastructure, ensuring optimal performance and uptime.

US

  • Define and build technical and business requirements for data protection to reduce cyber threats.
  • Conduct periodic data security audits and develop plans around remediating active threats.
  • Monitor and remediate cybersecurity threats, incidents, intrusions, and policy violations daily.

CEC Entertainment is a global leader in family entertainment and operates Chuck E. Cheese and Peter Piper restaurants. With over 10,000 employees, they are rapidly adapting to business environments and investing in technology to improve operations and drive value.

Australia

Join a new emerging team who is going to be part of Palo Alto’s Unit 42, working closely with global customers providing the best security in the market. Own an incident lifecycle from outbreak to full remediation. Work closely with Security Research, Threat Intelligence and Threat Hunting teams to remediate and detect new emerging threats.

Palo Alto Networks is a cybersecurity partner committed to protecting our digital way of life by challenging and disrupting the status quo.

$101,500–$120,000/yr
US

  • Identifying, scoping, and managing ongoing customer incidents, developing remediation plans, and augmenting the customer’s security gaps with the necessary skills and resources to improve their security maturity
  • Tailoring communication to the customer’s level of expertise, providing education and information to help them understand the bigger picture and make educated decisions
  • Partnering with the Detection Engineering, Intelligence, and Research teams to further investigate identified or emerging threats relevant to our customers

Zscaler accelerates digital transformation so our customers can be more agile, efficient, resilient, and secure. Our cloud native Zero Trust Exchange platform protects thousands of customers from cyberattacks and data loss by securely connecting users, devices, and applications in any location.

$100,000–$130,000/yr
US

  • Monitor and triage security alerts, ensuring timely and accurate threat identification.
  • Act as a primary responder for security incidents, managing the full incident response lifecycle.
  • Develop and refine threat detection capabilities by incorporating threat intelligence.

Jobgether uses an AI-powered matching process to ensure your application is reviewed quickly, objectively, and fairly against the role's core requirements.

US

Design, deploy, and operate network infrastructure to implement macro and micro segmentation. Operate UT’s Network Access Control (NAC) and Identity Based Network Services (IBNS) systems. Provide escalation support (tier 3+) for complex problems related to NAC and IBNS systems.

Enterprise Technology is dedicated to supporting the mission of the University of Texas at Austin of unlocking potential and preparing future leaders of the state.

US

  • Monitor and analyze security alerts to identify potential threats.
  • Conduct proactive threat hunting across different environments.
  • Investigate security incidents and determine root cause.

Globe Life is committed to empowering employees with support and opportunities to succeed in their careers. They foster a caring and innovative culture that enables them to grow and overcome challenges in a connected and collaborative environment.