Source Job

New Zealand

  • Keeps the lights on, data safe, and people moving fast.
  • Jumping into real incidents, guiding security decisions, and helping teams build securely from the start.
  • Contributing to reviews of business solutions, risk identification and secure‑by‑design practices.

SIEM SOAR Netskope Security Operations

18 jobs similar to Security Operations Specialist

Jobs ranked by similarity.

New Zealand

  • Supporting investigations, day‑to‑day operations, and the uplift of our security posture.
  • Jumping into real incidents, guiding security decisions, and helping teams build securely from the start.
  • Unpicking a phishing campaign and advising on a new solution or progressing vulnerability management.

Contact Energy believes home is the most important place in the world. They're a team that’s reimagining how Aotearoa is powered and how customers experience energy. Contact is guided by their tikanga and they touch lives to make life better.

$130,000–$160,000/yr
US

  • Conducts threat monitoring and analysis using threat detection tools.
  • Builds and maintains security infrastructure and system performance.
  • Triages alerts from detection platforms, identifying false positives and escalating attacks.

Nuvalent is dedicated to creating selective medicines with expertise in chemistry, specifically designed to meet the needs of cancer patients. They are an early-stage company that brings together experienced scientists and industry veterans with a history in oncology drug development and company building.

$155,763–$219,901/yr
US

  • Collaborating with Security Operations Center (SOC) team members to monitor, detect, and respond to cybersecurity threats in a timely manner.
  • Responding to cybersecurity incidents from identification through resolution.
  • Developing and maintaining up-to-date knowledge of the threat landscape, as well as advancements in cybersecurity technologies and methodologies.

Calendly's product helps connect millions of people. They are in the midst of exciting product growth and offer opportunities to learn and grow alongside top professionals.

$80,000–$100,000/yr
US Unlimited PTO

  • Deliver exceptional support experiences through security expertise and empathetic communication.
  • Provide expert-level advisory services on complex security questions and product issues.
  • Drive Security Operations team efficiency through process creation, optimization, and innovative feature ideas.

Blumira is a security operations platform built for growing teams and partners supporting them. They integrate comprehensive visibility, tools, and expert guidance to give IT and security teams peace of mind. The team is passionate about putting resilience in reach for every organization and helping teams build their own expertise.

US

  • Support and execute security incident response activities.
  • Operate and improve enterprise security controls and tooling.
  • Coordinate security investigations with DevOps, IT, and Engineering teams.

Keeper Security transforms cybersecurity for organizations around the world with next-generation privileged access management. Keeper’s zero-trust and zero-knowledge cybersecurity solutions are FedRAMP and GovRAMP Authorized, FIPS 140-2 validated, as well as SOC 2 and ISO 27001 certified.

$85,000–$85,000/yr
US

  • Detect and respond to security threats across network, systems, and cloud environments.
  • Troubleshoot and resolve complex technical issues, performing root cause analysis.
  • Act as an escalation point for unresolved alerts/issues and mentor SNOC Engineer I team members.

DYOPATH is committed to providing excellent technology services. They value innovation, collaboration, and continuous skill-building in a supportive team environment.

Global

  • 24/7 monitoring and alert triage across SIEM/EDR/cloud security tooling; identify false positives vs. credible threats and set appropriate severity.
  • Initial investigation and enrichment: gather relevant logs/telemetry, add context, and document findings clearly in the case/ticketing system.
  • Escalation and coordination: escalate confirmed/suspected incidents quickly and cleanly to L2/IR with a complete handoff (timeline, scope, IOCs, actions taken).

Keyrock is a leading change-maker in the digital asset space, renowned for its partnerships and innovation. They have over 200 team members around the world with a diverse team from 42 nationalities and backgrounds ranging from DeFi natives to PhDs.

$195,000–$210,000/yr
US 12w maternity

  • Lead the identification, triage, and validation of security incidents, acting as the ultimate escalation point for the SOC.
  • Drive organizational incident readiness by designing and executing practical response exercises to ensure first responders are prepared at all levels.
  • Lead cross-functional Post-Incident Reviews to extract critical lessons; drive specific tooling and process enhancements that harden organizational defenses.

Huntress is a fully remote, global team of passionate experts and ethical badasses on a mission to break down the barriers to cybersecurity. Founded in 2015 by former NSA cyber operators, Huntress protects all businesses with enterprise-grade, fully owned, and managed cybersecurity products. They protect 4M+ endpoints and 7M+ identities worldwide, elevating underresourced IT teams with protection that works as hard as they do.

$50,000–$60,000/yr
US 3w PTO

  • Monitor SIEM dashboard and security tools to detect security incidents.
  • Analyze alerts to determine relevance and prioritize response efforts.
  • Conduct investigations by gathering context and relevant logs.

Sentinel Blue is a young company focused on bringing enterprise-class cybersecurity to small and medium-sized businesses. They are pushing the envelope of how things are done and constantly seeking innovative ways to meet that mission in a fast-paced, dynamic environment that values learning and challenges.

$190,000–$225,000/yr
US

  • Triage, investigate, respond to, and remediate intrusions daily.
  • Mentor junior team members, allowing them to grow individually and as a team.
  • Contribute regularly to external-facing Huntress content such as blogs, webinars, presentations, and speaking engagements.

Huntress is a fully remote, global team of passionate experts and ethical badasses on a mission to break down the barriers to cybersecurity. Founded in 2015 by former NSA cyber operators, Huntress protects all businesses with enterprise-grade, fully owned, and managed cybersecurity products. They protect 4M+ endpoints and 7M+ identities worldwide, elevating underresourced IT teams with protection that works as hard as they do.

$106,000–$134,000/yr
US

  • Hands on experience with implementing and administering SentinelOne.
  • Experience with AWS and Azure cloud platforms.
  • Document security processes, procedures, policies and standards

Signet Jewelers is the world's largest retailer of diamond jewelry. They operate more than 2,800 stores worldwide and are a people-first company valuing their team members and the communities they serve.

LATAM

  • Responsibility for cybersecurity operations and systems administration.
  • Protecting critical infrastructure through monitoring and incident response.
  • Drive IT cybersecurity standards in support of SOC 2, HIPAA and compliance frameworks.

Founded in 2001, AireSpring is a leading provider of Cloud Communications, Managed Connectivity and Managed Security. They have delivered outstanding service to a large base of national and global customers, and have received more than 100 industry awards.

US

  • Manage Google SecOps/SIEM for threat detection, alerting, and investigation workflows.
  • Administer Thycotic/Delinea Secret Server for privileged credential management.
  • Maintain and configure Cyberhaven DLP for data loss prevention.

Redapt Inc. is a data center infrastructure integrator, technology engineering firm, and cloud services provider. They deliver innovative solutions and services that power our customers' most demanding applications and enable them to extract powerful insights from data.

US

  • Lead execution of the enterprise information security program.
  • Oversee threat detection/response, vulnerability management, and incident response processes.
  • Partner with Engineering and Infrastructure teams to secure cloud environments and CI/CD pipelines.

bswift transforms benefits administration, making it simpler and smarter. They serve thousands of companies and millions of people nationwide, reducing administrative burdens and freeing HR teams to focus on creating thriving, people-first workplaces.

US

  • Monitor security events and incidents to detect potential threats and vulnerabilities.
  • Support response to security incidents and manage the incident response process end-to-end.
  • Implement and monitor security measures to protect LTK’s infrastructure and assets.

LTK's mission is to empower the world’s premium lifestyle Creators to achieve maximum economic success by connecting brands, creators, and shoppers with a world-class shopping app and trusted tools and technology. LTK is headquartered in Dallas, TX, and currently operates on five continents and employs a diverse, multi-disciplinary team.

Global

  • Own the strategy and maturity roadmap for corporate monitoring, detection engineering, and operational security metrics.
  • Lead and develop Corporate Security Operations Analysts and the Corporate Threat Hunter & Detection Analyst.
  • Continuously improve alert quality, detection coverage, triage workflows, and operational automation.

Onebrief provides collaboration and AI-powered workflow software designed specifically for military staffs, making the staff faster, smarter, and more efficient. Valued at $2.15B, the company's team spans veterans from all forces and global organizations, and technologists from leading-edge software companies.

$200,000–$220,000/yr
US 12w maternity

  • Responsible for running Rapid Response incidents, including coordinating with other departments, and owning the process end-to-end.
  • Conducts research on emerging adversary tradecraft to help scope and conduct hunt missions
  • Responsible for aggregating threat data to build out reports for customers to show Huntress’ value, and inform them of various threats that have been seen and reported

Huntress is a fully remote, global team of passionate experts and ethical badasses on a mission to break down the barriers to cybersecurity. Founded in 2015 by former NSA cyber operators, we protect all businesses with enterprise-grade, fully owned, and managed cybersecurity products at the price of an affordable SaaS application.

Australia New Zealand

  • Acting as a senior escalation point and incident coordinator for security incidents across Canva’s cloud, endpoint, and SaaS environments.
  • Leading and actively participating in security incident response, from initial detection through investigation, containment, eradication, and recovery.
  • Performing deep forensic analysis to determine scope, impact, and root cause, and translating technical findings into clear outcomes for stakeholders.

Canva is a design platform. They have campuses in Sydney and Melbourne and co-working spaces in Brisbane, Perth and Adelaide.