Source Job

US Unlimited PTO

  • Work with observability products like SIEM, SOAR, and data stream management tools.
  • Set up, modify, and tune alerts within the SIEM to ensure critical threats are identified properly.
  • Collaborate with internal stakeholders and external vendors to produce clear reports and documentation.

SIEM SOAR SOC

14 jobs similar to SecOps Observability Engineer

Jobs ranked by similarity.

US Unlimited PTO

  • Architect, implement, and maintain SIEM solutions with a focus on modern platforms.
  • Design and manage log ingestion pipelines using tools such as Cribl Stream, Edge, or Search.
  • Develop custom parsers, dashboards, correlation rules, and alerting logic for security analytics and threat detection.

GuidePoint Security provides trusted cybersecurity expertise, solutions, and services that help organizations make better decisions and minimize risk. Since its inception in 2011, GuidePoint has grown to over 1000 employees and established strategic partnerships with leading security vendors.

New Zealand

  • Supporting investigations, day‑to‑day operations, and the uplift of our security posture.
  • Jumping into real incidents, guiding security decisions, and helping teams build securely from the start.
  • Unpicking a phishing campaign and advising on a new solution or progressing vulnerability management.

Contact Energy believes home is the most important place in the world. They're a team that’s reimagining how Aotearoa is powered and how customers experience energy. Contact is guided by their tikanga and they touch lives to make life better.

New Zealand

  • Keeps the lights on, data safe, and people moving fast.
  • Jumping into real incidents, guiding security decisions, and helping teams build securely from the start.
  • Contributing to reviews of business solutions, risk identification and secure‑by‑design practices.

Contact Energy is a power, mobile, and broadband company that is transforming how Aotearoa is powered, leading the charge on renewable energy and digitising customer journeys. They are a team of 1000+ from all walks of life. They value caring for each other, learning from one another, and being guided by their tikanga.

$130,000–$160,000/yr
US

  • Conducts threat monitoring and analysis using threat detection tools.
  • Builds and maintains security infrastructure and system performance.
  • Triages alerts from detection platforms, identifying false positives and escalating attacks.

Nuvalent is dedicated to creating selective medicines with expertise in chemistry, specifically designed to meet the needs of cancer patients. They are an early-stage company that brings together experienced scientists and industry veterans with a history in oncology drug development and company building.

$50,000–$60,000/yr
US 3w PTO

  • Monitor SIEM dashboard and security tools to detect security incidents.
  • Analyze alerts to determine relevance and prioritize response efforts.
  • Conduct investigations by gathering context and relevant logs.

Sentinel Blue is a young company focused on bringing enterprise-class cybersecurity to small and medium-sized businesses. They are pushing the envelope of how things are done and constantly seeking innovative ways to meet that mission in a fast-paced, dynamic environment that values learning and challenges.

$80,000–$100,000/yr
US Unlimited PTO

  • Deliver exceptional support experiences through security expertise and empathetic communication.
  • Provide expert-level advisory services on complex security questions and product issues.
  • Drive Security Operations team efficiency through process creation, optimization, and innovative feature ideas.

Blumira is a security operations platform built for growing teams and partners supporting them. They integrate comprehensive visibility, tools, and expert guidance to give IT and security teams peace of mind. The team is passionate about putting resilience in reach for every organization and helping teams build their own expertise.

Europe

  • Act as the technical Subject Matter Expert for enterprise cybersecurity log data management solutions.
  • Define and implement scalable, modular, secure, and maintainable solutions.
  • Create and maintain architecture artifacts describing system High-Level Design and Low-Level Design.

Jobgether uses an AI-powered matching process to ensure applications are reviewed quickly, objectively, and fairly against the role's core requirements. They identify the top-fitting candidates, and this shortlist is then shared directly with the hiring company.

US Unlimited PTO

  • Ability to autonomously prioritize and successfully deliver across a portfolio of projects.
  • Learn and keep up with current cyber threats, attack methodology, active campaigns, and detection techniques using a wide variety of capabilities and sources.
  • Understand and utilize cyber threat intelligence sources.

GuidePoint Security provides trusted cybersecurity expertise, solutions and services that help organizations make better decisions and minimize risk. They are a rapidly growing, profitable, privately-held value added reseller with over 1,200 employees, and an enjoyable workplace atmosphere.

US

  • Manage Google SecOps/SIEM for threat detection, alerting, and investigation workflows.
  • Administer Thycotic/Delinea Secret Server for privileged credential management.
  • Maintain and configure Cyberhaven DLP for data loss prevention.

Redapt Inc. is a data center infrastructure integrator, technology engineering firm, and cloud services provider. They deliver innovative solutions and services that power our customers' most demanding applications and enable them to extract powerful insights from data.

US

  • Monitor security events and incidents to detect potential threats and vulnerabilities.
  • Support response to security incidents and manage the incident response process end-to-end.
  • Implement and monitor security measures to protect LTK’s infrastructure and assets.

LTK's mission is to empower the world’s premium lifestyle Creators to achieve maximum economic success by connecting brands, creators, and shoppers with a world-class shopping app and trusted tools and technology. LTK is headquartered in Dallas, TX, and currently operates on five continents and employs a diverse, multi-disciplinary team.

Global

  • 24/7 monitoring and alert triage across SIEM/EDR/cloud security tooling; identify false positives vs. credible threats and set appropriate severity.
  • Initial investigation and enrichment: gather relevant logs/telemetry, add context, and document findings clearly in the case/ticketing system.
  • Escalation and coordination: escalate confirmed/suspected incidents quickly and cleanly to L2/IR with a complete handoff (timeline, scope, IOCs, actions taken).

Keyrock is a leading change-maker in the digital asset space, renowned for its partnerships and innovation. They have over 200 team members around the world with a diverse team from 42 nationalities and backgrounds ranging from DeFi natives to PhDs.

$155,763–$219,901/yr
US

  • Collaborating with Security Operations Center (SOC) team members to monitor, detect, and respond to cybersecurity threats in a timely manner.
  • Responding to cybersecurity incidents from identification through resolution.
  • Developing and maintaining up-to-date knowledge of the threat landscape, as well as advancements in cybersecurity technologies and methodologies.

Calendly's product helps connect millions of people. They are in the midst of exciting product growth and offer opportunities to learn and grow alongside top professionals.

Global

  • Own the strategy and maturity roadmap for corporate monitoring, detection engineering, and operational security metrics.
  • Lead and develop Corporate Security Operations Analysts and the Corporate Threat Hunter & Detection Analyst.
  • Continuously improve alert quality, detection coverage, triage workflows, and operational automation.

Onebrief provides collaboration and AI-powered workflow software designed specifically for military staffs, making the staff faster, smarter, and more efficient. Valued at $2.15B, the company's team spans veterans from all forces and global organizations, and technologists from leading-edge software companies.

$85,000–$85,000/yr
US

  • Detect and respond to security threats across network, systems, and cloud environments.
  • Troubleshoot and resolve complex technical issues, performing root cause analysis.
  • Act as an escalation point for unresolved alerts/issues and mentor SNOC Engineer I team members.

DYOPATH is committed to providing excellent technology services. They value innovation, collaboration, and continuous skill-building in a supportive team environment.