5 days ago
New York, NY, USAMid Level / Senior
Base Salary
$105k - $131k/yr
Responsibilities
- Monitor and analyze network, server, endpoint, database, and application activities for indicators of compromise.
- Automate alert collection, prioritization, tasks, and processes.
- Lead incident response efforts, conducting thorough remediation and root cause analysis.
- Enhance security posture for large-scale customer-facing hybrid cloud environments.
- Drive growth and maturity of the threat hunting program.
- Contribute to security process enhancement and documentation.
- Evaluate and conduct proof-of-concepts for innovative technologies.
- Foster cross-departmental integration and mentor business units in cybersecurity best practices.
Requirements
- Experience in cybersecurity operations and incident response.
- Proficient with SIEM platforms, IDS/IPS, and vulnerability management tools.
- Experience with large, complex networks and systems.
- Bachelor's degree in Information Security, Engineering, Computer Science, or related field preferred.
- Understanding of the MITRE ATT&CK framework.
- Programming/scripting experience in bash, python, or PowerShell.
- Knowledge of log ingestion pipelines and log parsing.
- Ability to write detections using YAML and JSON.
- Excellent verbal and written communication skills.
- At least one relevant certification such as CISSP, CEH, or Security+.
Benefits
- Array of health plans including mental health support and fitness benefits.
- Generous paid time off and sick leave.
- 401k with up to a 5% match.
- Commuter benefits and pet insurance.
- Annual bonus and long-term incentive opportunities.
