Information Security Analyst II- SOC

O'Reilly Auto PartsHeadquarters, KY
Onsite

About The Position

The Information Security Analyst II (SOC) analyzes and monitors the organization’s cybersecurity measures; respond to actual penetration attempts by malicious hackers. This is an on-site position located in Springfield, MO.

Requirements

  • Experience with Endpoint Detection & Response (EDR) tools
  • Experience with CrowdStrike and endpoint agents deployed on hosts
  • Knowledge of SIEM platforms and log correlation
  • Experience creating detections/use cases within a SIEM environment
  • Familiarity with: Crowdstrike NG-SIEM or different log types and log analysis.
  • Implements transaction security and computer/network virus protection.
  • Maintains system/service and information security, integrity, compliance and continuity.
  • Ensures the confidentiality, integrity, and availability of information.
  • Determines and analyzes trends from data that is collected to assist in compiling reports that will help in decision-making.
  • Understanding of MITRE ATT&CK Framework
  • Ability to apply MITRE ATT&CK concepts to real world
  • Creates clear, comprehensive, effective, and user-friendly guides, manuals, narratives, and reports that convey complex technical concepts, using documentation tools to craft structured and visually appealing content that meets the intended purposes.
  • Acquires, organizes, protects and processes data in order to fulfill business objectives.
  • Understands and effectively uses standard office equipment and standard software packages to support business processes.
  • Creates reports, and reviews reports created by others, for various audiences as relevant, in a lucid and effective manner, keeping in mind the purpose of reports.

Responsibilities

  • Continuously monitor firewalls, intrusion detection/prevention systems (IDS/IPS), and security information and event management (SIEM) platform for potential security threats.
  • Review and analyze system logs and alerts, escalating suspicious activities to senior analysts when necessary.
  • Identify, analyze, and respond to security incidents, including data breaches, malware infections, and unauthorized access attempts.
  • Work, within team, to create and maintain incident documentation, containment procedures, and remediation efforts under the direction of senior analysts.
  • Analyze malicious emails reported by team members and report patterns to next tier information security analysts.
  • Conduct security testing, verification and risk analysis of the Company network and systems
  • Create and maintain technical and/or user documentation to a high standard.
  • Collate and analyze data using preset tools, methods, and formats.
  • Involves working independently.
  • Work within established procedures to achieve specified goals.
  • Explore and develop a detailed understanding of external developments or emerging issues and contribute to the evaluation of their potential impact on, or usefulness to, the organization.
  • Provide fault isolation and resolution for complex challenges to limit and address issues promptly.

Benefits

  • Competitive Wages & Paid Time Off
  • Stock Purchase Plan & 401k with Employer Contributions Starting Day One
  • Medical, Dental, & Vision Insurance with Optional Flexible Spending Account (FSA)
  • Team Member Health/Wellbeing Programs
  • Tuition Educational Assistance Programs
  • Opportunities for Career Growth
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service