This role is accountable for defining and streamlining processes, workflows, and playbooks that enable effective day-to-day operations. As Huntress continues to grow, they are laser-focused on scaling operations and force-multiplying analysts. The Security Operations Manager will work with peer regional managers to ensure consistent global operations while providing the analyst team with training opportunities and career growth.
Job listings
This role is designed for a technically skilled and proactive cyber security professional who thrives in a dynamic, fast-paced environment. You will play a critical role in protecting the organisation from cyber threats, managing incidents, and ensuring the continuous operation of security systems. The position involves hands-on technical work with security tools, vulnerability management, and incident response, while also contributing to strategic security initiatives.
Palo Alto Networks is seeking a Threat Hunting Researcher to join Unit 42's Managed Services group. Threat Hunters in Unit 42 play a critical role in safeguarding organizations against cyber threats by proactively searching for threats across multiple datasets. They are responsible for leading and conducting threat hunting activities related to malware, threat actor groups, and campaign activity.
The Security Incident Command (SIC) team is seeking a senior security incident commander to join our fast-growing team, supporting the orchestration of incident response strategy and communications during critical information security-related incidents. This role involves taking ownership of incident response, developing documentation, delivering communications, and contributing to post-incident reviews to improve incident management and response strategies.
Spearhead security at Narvar, where you'll help drive decisions on how best to secure our platform & products. Develop, implement, and monitor a strategic, comprehensive enterprise information security and IT risk management program. Provide strategic risk guidance for IT projects, including the evaluation and recommendation of technical controls. Responding to security incidents and breaches
As the new member of the InfoSec team, this role will own critical security initiatives end-to-end, working side-by-side with Engineers to harden our cloud-native SaaS platform and significantly raise our overall security posture. This is a high-impact, high-autonomy role perfect for a self-starter who enjoys building and deploying scalable security processes in a scale-up environment.
This role is client-facing and requires the Principal Consultant to lead and produce deliverables based on proactive services engagements. The Principal Consultant will work directly with multiple customers and key stakeholders (security teams, system and network administrators and owners, C-Suite, etc.) to manage and deliver proactive incident preparedness engagements, as well as wider proactive assessments and services.
Provide advice and guidance to Arootah clients who seek help with their Cybersecurity needs. This will involve consulting to some of the leading Alternative Asset Firms and Family Offices in the world and sharing your experience as a Chief Information Security Officer in helping clients to serve as strategic cybersecurity advisor. The role involves developing and implementing comprehensive cybersecurity programs and conducting risk assessments.
The Security Operations team is a central pillar of our growth strategy, and Vultr is looking for a Senior Manager of Incident Response to oversee the day-to-day operations of the incident management and response team. This role involves executing incident response strategies, coordinating with cross-functional teams during security incidents, and improving processes based on post-incident reviews.
This position requires work hours of 4:45 PM to 1:00 AM EST, where you'll be responsible for cyber threat intelligence, event monitoring, response, and threat hunting. As a member of the Cyber Response team, utilize your technical expertise to assess, contain, and remediate cyber threats, mentor and share knowledge with others, and manage workflows, escalations, and advance technical processes to build program maturity and growth.