This role is responsible for analyzing activities relating to monitoring and responding to security events. This role receives, researches, triages and documents all security events and alerts as they are received. This individual supports multiple security-related platforms and technologies, interfacing with others within the IT organization, as well as other internal business units and external customers/partners. Events will be generated from endpoints, networks, security information and event management (SIEM) systems, threat intelligence platforms, employees, third-parties, and other sources. This role also receives information sharing and analysis center (ISAC) information and is expected to hunt for potential compromise across the infrastructure. Additionally, personnel in this role serve across all areas of threat intelligence and detection engineering competencies to help inform and defend the business, and protect brand reputation. The incumbent monitors application, host and network threats, including external threat actors and rogue insiders by reviewing and developing complex detections across the security product landscape. As a trusted member of the cybersecurity team and industry community, the candidate works closely with internal technical teams, business units and external entities aligned with the business, including private intelligence-sharing groups, law enforcement, government agencies and public affiliation peers.
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Entry Level
Number of Employees
5,001-10,000 employees