The Incident Response Analyst will provide cyber situational awareness and threat monitoring services for our law enforcement customer, analyzing threats and developing metrics-based methods of situational awareness. The analyst will create correlation rules, improve efficiency in detecting incidents, and engage with stakeholders and vendors. They will also define and drive the implementation of User Activity Monitoring.
Job listings
Zscaler's Red Canary Cyber Incident Response Team (CIRT) is seeking a SkillBridge Intern to push the boundaries of threat detection and response. The intern will use Zscalerβs detection platform to analyze EDR telemetry, alerts, and log sources across several detection domains, publish threats for customers, research coverage opportunities, create new detectors, and improve the CIRT workflow through orchestration & automation.
As CoinTrackerβs first Security Engineer, build the infrastructure, processes, and culture needed to protect our systems, data, and users. Define and execute the security roadmap, balancing near-term wins with long-term investments across infrastructure, cloud, application security, and security operations. Conduct a security gap assessments and implement baseline controls, policies, and best practices.
The Intelligence, Detection, and Response (IDR) team plays a central role in protecting Zapier's systems, data, and customers. As an IDR Engineer, you'll lead vulnerability management and detection engineering, set the vision for risk identification and remediation, create security detections, manage the SIEM, and run complex incidents. The role combines program leadership with technical work.
We are seeking a seasoned security professional to lead and scale our Security Operations Center, where you'll establish and refine SOC processes, mentor a team, and be the primary contact for incident response and security monitoring. You will partner with engineering, IT, and executive leadership to align security operations with business objectives, ensure compliance, and improve our capabilities.
Play a vital role in keeping StackAdaptβs systems and information secure by detailing and implementing enterprise security processes and procedures with an approach of continual process improvement and scalability. You will undertake cyber security activities and contribute to the management of risks posed to StackAdaptβs systems and information, from both internal and external security threats.
The Threat Intelligence Engineer will support Elementβs Threat Intelligence program to identify, assess, and ensure the solution meets operational needs for monitoring, oversight, and investigation responsibility through actionable threat intelligence and proactive risk mitigation strategies. The ideal candidate is a technical expert with deep knowledge of the threat landscape and strong analytical skills.
This role is pivotal in enhancing Marqetaβs ability to detect and respond to threats. You will contribute to the design, documentation, and implementation of a security detection engineering program, participate in on-call rotations and incident response efforts. This role offers the opportunity to directly impact the program through strong technical contributions.
This role is responsible for identifying, assessing, and mitigating potential threats to executives, employees, operations, and assets through comprehensive intelligence gathering and analysis. The ideal candidate will have experience in threat intelligence, OSINT, risk analysis, and protective operations support. You will develop and implement protective intelligence strategies.
We are seeking a security-minded, hands-on individual with Security Operations experience to support our global 24x7 monitoring and incident response programs. The candidate must have strong operational knowledge of the security tool landscape. This role is integral to the GIS program, and works directly alongside the Security Architecture / Engineering, Tech Infrastructure and Network teams.