About The Position

Performs system monitoring and analysis support for the detection of cyber incidents and provides recommendations on how to correct findings.

Requirements

  • System monitoring and analysis support for cyber incident detection
  • Recommendations for correcting findings
  • Network data analysis (packet capture, network flow, Cloud Logs)
  • Assistance with remediation of cybersecurity issues (vulnerabilities, misconfigurations, incidents, non-compliance)
  • Analysis, recommendations, and verification for security incident mitigation
  • Generation and publication of monthly cybersecurity posture reports
  • Daily review of open vulnerabilities using Network and Endpoint security solutions
  • Reporting on high risk findings and tracking mitigation efforts
  • Enforcement of endpoint quarantine policies
  • Assistance with preparation for cybersecurity posture assessments
  • Coordination with customers and operational teams for mitigation
  • Interface with external entities (law enforcement, intelligence/government agencies)

Responsibilities

  • Analyzes network data using packet capture analysis, network flow analysis, as well as Cloud Logs to identify and report on potential security incidents.
  • Assists customers with remediation of a wide range of cybersecurity issues including vulnerabilities, misconfigurations, cyber incidents, and non-compliance.
  • Provides analysis, recommendations, and verification to achieve acceptable mitigation of security incidents.
  • Generates and publishes monthly reports providing customers with a summary of their cyber security posture as well as tracking customers with consistent issues.
  • Conducts daily review of open vulnerabilities using both Network and Endpoint based security solutions, reporting on high risk findings and tracking mitigation efforts until resolved.
  • Enforces endpoint quarantine policies on extremely high risk devices using Endpoint Security Solution.
  • Assists customers in preparing for upcoming cyber security posture assessments by providing overview of topics covered by assessment, and coordinating with customer and other operational teams to mitigate potential high risk findings observed on the site's network.
  • May interface with external entities (e.g. law enforcement, intelligence/government agencies, etc.)

Benefits

  • Employee-centric culture
  • Benefits
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service