A talented professional is needed to join the Security Operations Center (SOC) team as a L1 SOC Analyst. The role involves detecting, analyzing, and responding to cybersecurity threats and incidents, requiring strong analytical skills, knowledge of security operations, and expertise with SIEM platforms, especially Microsoft Sentinel. Responsibilities include real-time monitoring, incident investigation, and collaboration with other cybersecurity teams.
Job listings
This role strengthens and optimizes the organization's security capabilities by reviewing existing tools, applications, and processes to identify gaps and establishes and maintains cloud security architecture best practices, focusing on cloud platforms and integrates new and existing security platforms. The role collaborates with R&D teams to maintain a secure architecture and analyzes security events for anomalous activity.
This position requires work hours of 4:45 PM to 1:00 AM EST, where you'll be responsible for cyber threat intelligence, event monitoring, response, and threat hunting. As a member of the Cyber Response team, utilize your technical expertise to assess, contain, and remediate cyber threats, mentor and share knowledge with others, and manage workflows, escalations, and advance technical processes to build program maturity and growth.
We are looking for a Senior Security Engineer who is passionate about securing innovative products within the Public Relations software space. You will interact with stakeholders across Engineering, DevOps, Product, and IT Operations. You will be delivering strategic and tactical security guidance for IT and Engineering initiatives and designing and implementing security controls that support NIST, SOC2, ISO27001, FedRAMP, and TISAX frameworks.
Perform real-time monitoring and analysis of security events and alerts from various security tools, including SIEM (Sentinel), Microsoft Defender Suite, Firewalls, IDS/IPS, WAFs, and other security logs. Analyze telemetry from Microsoft Defender products within Microsoft Sentinel. Conduct in-depth investigations of escalated security incidents, performing root cause analysis to understand the full scope and impact.
Investigate and analyze malicious automation tools, cheating scripts, and hacking utilities used by underground groups to exploit the companyโs marketing campaigns. Deliver structured analysis reports on attack chains, ecosystem trends, and technical evolution.
You will be instrumental in designing, building, and maintaining robust security features for our SaaS product that will delight our customer CIOs, working on challenging problems at the intersection of application development and security, directly contributing to the resilience and trustworthiness of our platform and protecting our customers and their data 24/7.
Assist with the end-to-end coordination of data breach response projects, including data ingestion, preservation, processing, analytics, and mining. Support the use of advanced data analytics tools to extract, analyze, and classify sensitive data. Interface with clients, forensic examiners, legal counsel, and insurance partners to ensure accurate and timely data analysis and reporting.
As Senior Information Security AnalystโฏIII, you will be a key contributor to our day-to-day security operations, assisting with threat monitoring, incident triage, vulnerability remediation, and GRC activities. This role is an excellent opportunity for someone with security experience who is eager to grow their skills in risk management, cloud environments and security best practices.
In this role, you will be at the intersection of Artificial Intelligence and Cybersecurity as a key expert in our brand-new AI Security services. You will lead our customers through securing their AI and Machine Learning (ML) pipelines from development to runtime. This is a unique opportunity to become a foundational member of a team that is defining the best practices for AI Security in the real world.