The Incident Response Analyst will provide cyber situational awareness and threat monitoring services for our law enforcement customer, analyzing threats and developing metrics-based methods of situational awareness. The analyst will create correlation rules, improve efficiency in detecting incidents, and engage with stakeholders and vendors. They will also define and drive the implementation of User Activity Monitoring.
Job listings
We are seeking an experienced and highly skilled SIEM Engineer/Developer to join our cybersecurity team to lead the design, implementation, and optimization of SIEM / SOAR / Data Pipeline solutions across a variety of modern toolsets.
We're looking for a sharp SOC Engineer to boost detection & response, automate workflows, and integrate open-source tools for a 6β12+ Month Contract. Required skills include SIEM & SOAR expertise, Python for scripting & automation, Kubernetes & container orchestration, strong Linux admin skills, experience with SQL/NoSQL & Elastic, advanced Splunk usage and Open-source tools experience such as Wazuh, Teleport or OpenCTI.
The Junior Security Analyst will play a critical role in Nava PBCβs Information Technology department, supporting the organizationβs cybersecurity initiatives. The primary focus will be assisting with deploying security hardware, implementing advanced monitoring systems, and responding to security alerts. This role involves working with tools like CrowdStrike and hardware security keys to enhance the companyβs endpoint protection and centralized security monitoring capabilities.
The Investigations Lead will be a critical team member within the new Versant Cyber organization and safeguarding the companyβs people, data, and infrastructure by uncovering and responding to malicious or negligent activities. This individual is responsible for collaborating with HR and Legal to oversee and execute complex investigations into cybersecurity incidents.
Seeking a Security Information and Event Management (SIEM) Analyst with a strong understanding of SIEM systems. The role involves configuring, maintaining, and troubleshooting the system, writing query and correlation rules, generating reports and alerts, and conducting baseline analysis. Requires advanced knowledge in current data and voice technologies, security technologies and tools, and a strong understanding of information security related regulations, standards, and best practices.
The Intelligence, Detection, and Response (IDR) team plays a central role in protecting Zapier's systems, data, and customers. As an IDR Engineer, you'll lead vulnerability management and detection engineering, set the vision for risk identification and remediation, create security detections, manage the SIEM, and run complex incidents. The role combines program leadership with technical work.
The Security Operations team is looking for a Threat Intelligence Analyst to help drive their vision of a proactive and predictive security posture. Youβll be at the forefront of threat intelligence efforts, working to gather and analyze critical data on emerging threats and trends, and using your expertise to inform defenses and protect customers.
As a Security Operations Analyst at Quanata, you will serve as a frontline defender within our Security Operations Center (SOC), responsible for monitoring alerts, investigating threats, and supporting the effectiveness of our detection and response workflows. You will work closely with engineering, IT, and other security teams to triage incidents, assess risks, and drive operational improvements across our hybrid infrastructure.
We are seeking a seasoned security professional to lead and scale our Security Operations Center, where you'll establish and refine SOC processes, mentor a team, and be the primary contact for incident response and security monitoring. You will partner with engineering, IT, and executive leadership to align security operations with business objectives, ensure compliance, and improve our capabilities.