Ability to autonomously prioritize and successfully deliver across a portfolio of projects.
Learn and keep up with current cyber threats, attack methodology, active campaigns, and detection techniques using a wide variety of capabilities and sources.
Understand and utilize cyber threat intelligence sources.
Keeps the lights on, data safe, and people moving fast.
Jumping into real incidents, guiding security decisions, and helping teams build securely from the start.
Contributing to reviews of business solutions, risk identification and secure‑by‑design practices.
Contact Energy is a power, mobile, and broadband company that is transforming how Aotearoa is powered, leading the charge on renewable energy and digitising customer journeys. They are a team of 1000+ from all walks of life. They value caring for each other, learning from one another, and being guided by their tikanga.
Collaborating with Security Operations Center (SOC) team members to monitor, detect, and respond to cybersecurity threats in a timely manner.
Responding to cybersecurity incidents from identification through resolution.
Developing and maintaining up-to-date knowledge of the threat landscape, as well as advancements in cybersecurity technologies and methodologies.
Calendly's product helps connect millions of people. They are in the midst of exciting product growth and offer opportunities to learn and grow alongside top professionals.
Supporting investigations, day‑to‑day operations, and the uplift of our security posture.
Jumping into real incidents, guiding security decisions, and helping teams build securely from the start.
Unpicking a phishing campaign and advising on a new solution or progressing vulnerability management.
Contact Energy believes home is the most important place in the world. They're a team that’s reimagining how Aotearoa is powered and how customers experience energy. Contact is guided by their tikanga and they touch lives to make life better.
Responsible for running Rapid Response incidents, including coordinating with other departments, and owning the process end-to-end.
Conducts research on emerging adversary tradecraft to help scope and conduct hunt missions
Responsible for aggregating threat data to build out reports for customers to show Huntress’ value, and inform them of various threats that have been seen and reported
Huntress is a fully remote, global team of passionate experts and ethical badasses on a mission to break down the barriers to cybersecurity. Founded in 2015 by former NSA cyber operators, we protect all businesses with enterprise-grade, fully owned, and managed cybersecurity products at the price of an affordable SaaS application.
Manage Google SecOps/SIEM for threat detection, alerting, and investigation workflows.
Administer Thycotic/Delinea Secret Server for privileged credential management.
Maintain and configure Cyberhaven DLP for data loss prevention.
Redapt Inc. is a data center infrastructure integrator, technology engineering firm, and cloud services provider. They deliver innovative solutions and services that power our customers' most demanding applications and enable them to extract powerful insights from data.
Work with observability products like SIEM, SOAR, and data stream management tools.
Set up, modify, and tune alerts within the SIEM to ensure critical threats are identified properly.
Collaborate with internal stakeholders and external vendors to produce clear reports and documentation.
GuidePoint Security provides cybersecurity expertise, solutions, and services to help organizations make better decisions and minimize risk. The company has over 1,200 employees and serves as a trusted advisor to more than 6,200 customers, fostering a collaborative and enjoyable workplace atmosphere.
Conducts threat monitoring and analysis using threat detection tools.
Builds and maintains security infrastructure and system performance.
Triages alerts from detection platforms, identifying false positives and escalating attacks.
Nuvalent is dedicated to creating selective medicines with expertise in chemistry, specifically designed to meet the needs of cancer patients. They are an early-stage company that brings together experienced scientists and industry veterans with a history in oncology drug development and company building.
Monitor security events and incidents to detect potential threats and vulnerabilities.
Support response to security incidents and manage the incident response process end-to-end.
Implement and monitor security measures to protect LTK’s infrastructure and assets.
LTK's mission is to empower the world’s premium lifestyle Creators to achieve maximum economic success by connecting brands, creators, and shoppers with a world-class shopping app and trusted tools and technology. LTK is headquartered in Dallas, TX, and currently operates on five continents and employs a diverse, multi-disciplinary team.
Monitor SIEM dashboard and security tools to detect security incidents.
Analyze alerts to determine relevance and prioritize response efforts.
Conduct investigations by gathering context and relevant logs.
Sentinel Blue is a young company focused on bringing enterprise-class cybersecurity to small and medium-sized businesses. They are pushing the envelope of how things are done and constantly seeking innovative ways to meet that mission in a fast-paced, dynamic environment that values learning and challenges.
24/7 monitoring and alert triage across SIEM/EDR/cloud security tooling; identify false positives vs. credible threats and set appropriate severity.
Initial investigation and enrichment: gather relevant logs/telemetry, add context, and document findings clearly in the case/ticketing system.
Escalation and coordination: escalate confirmed/suspected incidents quickly and cleanly to L2/IR with a complete handoff (timeline, scope, IOCs, actions taken).
Keyrock is a leading change-maker in the digital asset space, renowned for its partnerships and innovation. They have over 200 team members around the world with a diverse team from 42 nationalities and backgrounds ranging from DeFi natives to PhDs.
Triage, investigate, respond to, and remediate intrusions daily.
Mentor junior team members, allowing them to grow individually and as a team.
Contribute regularly to external-facing Huntress content such as blogs, webinars, presentations, and speaking engagements.
Huntress is a fully remote, global team of passionate experts and ethical badasses on a mission to break down the barriers to cybersecurity. Founded in 2015 by former NSA cyber operators, Huntress protects all businesses with enterprise-grade, fully owned, and managed cybersecurity products. They protect 4M+ endpoints and 7M+ identities worldwide, elevating underresourced IT teams with protection that works as hard as they do.
Deliver exceptional support experiences through security expertise and empathetic communication.
Provide expert-level advisory services on complex security questions and product issues.
Drive Security Operations team efficiency through process creation, optimization, and innovative feature ideas.
Blumira is a security operations platform built for growing teams and partners supporting them. They integrate comprehensive visibility, tools, and expert guidance to give IT and security teams peace of mind. The team is passionate about putting resilience in reach for every organization and helping teams build their own expertise.
Lead the identification, triage, and validation of security incidents, acting as the ultimate escalation point for the SOC.
Drive organizational incident readiness by designing and executing practical response exercises to ensure first responders are prepared at all levels.
Lead cross-functional Post-Incident Reviews to extract critical lessons; drive specific tooling and process enhancements that harden organizational defenses.
Huntress is a fully remote, global team of passionate experts and ethical badasses on a mission to break down the barriers to cybersecurity. Founded in 2015 by former NSA cyber operators, Huntress protects all businesses with enterprise-grade, fully owned, and managed cybersecurity products. They protect 4M+ endpoints and 7M+ identities worldwide, elevating underresourced IT teams with protection that works as hard as they do.
Architect, implement, and develop automations within the SOAR system/case management.
Design and develop automations and case management templates to ease analyst investigation/remediation.
Expertise developing SOC and security-focused content and automation.
GuidePoint Security provides cybersecurity expertise, solutions, and services to help organizations make better decisions and minimize risk. The company has over 1000 employees and has established strategic partnerships with leading security vendors, serving as a trusted advisor to over 4,200 customers.
Architect, implement, and maintain SIEM solutions with a focus on modern platforms.
Design and manage log ingestion pipelines using tools such as Cribl Stream, Edge, or Search.
Develop custom parsers, dashboards, correlation rules, and alerting logic for security analytics and threat detection.
GuidePoint Security provides trusted cybersecurity expertise, solutions, and services that help organizations make better decisions and minimize risk. Since its inception in 2011, GuidePoint has grown to over 1000 employees and established strategic partnerships with leading security vendors.
Provide security monitoring and incident response of cyber security events.
Monitor and analyze logs and alerts to identify actionable security incidents.
Provide proactive “threat hunting” to detect incidents.
SonicWall is a cybersecurity company with more than 30 years of expertise. They are recognized as a leading partner-first company, ensuring their partners and their customers are never alone in the fight against cybercrime.
Perform host/network based forensic investigations to collect and preserve evidence related to incidents
Managing incoming queues of detection alerts, threat reports and security incidents
Prioritizing and triaging competing incidents to maintain Service Level Agreements (SLA)
Nielsen provides powerful insights that drive client decisions and deliver extraordinary results, enabling a better media future. They are a dynamic global workforce committed to capturing audience engagement with content, standing at the forefront of the media revolution.
Support and execute security incident response activities.
Operate and improve enterprise security controls and tooling.
Coordinate security investigations with DevOps, IT, and Engineering teams.
Keeper Security transforms cybersecurity for organizations around the world with next-generation privileged access management. Keeper’s zero-trust and zero-knowledge cybersecurity solutions are FedRAMP and GovRAMP Authorized, FIPS 140-2 validated, as well as SOC 2 and ISO 27001 certified.
Use all-source intelligence to monitor security incidents and trends.
Support the Client’s trust and safety function to monitor and respond to issues.
Escalate security incidents to client stakeholders, following efficient procedures.
Sibylline is a leading intelligence and strategic risk consultancy in the security sector. Since 2010 they have supported businesses, governments and NGOs through the provision of high-quality risk analysis, due diligence and consultancy services.
Design and implement cloud security guardrails across AWS and GCP
Embed policy enforcement and compliance checks directly into Terraform modules
Conduct architecture reviews and continuously harden multi-cloud environments
Beast Industries is a multifaceted media and entertainment company founded by Jimmy Donaldson, popularly known as MrBeast. We are known for revolutionizing digital content creation, encompassing ventures that extend far beyond YouTube.