Security Analyst

Trend MicroIrving, TX
Hybrid

About The Position

In this role, you're not just monitoring alerts. You're building the foundation of trusted customer partnerships by translating security events into clear, actionable intelligence. Working alongside AI systems that accelerate your detection capabilities, you'll distinguish genuine threats from noise, contain emerging incidents and deliver the kind of clear, confident communication that customers rely on when it matters most. As a Security Analyst, you'll be the first line of defense, monitoring security events across Fortune 500 enterprises and critical infrastructure. You'll investigate real-time alerts, analyze suspicious behavior through the MITRE ATT&CK framework and contribute to the continuous refinement of detection rules that improve our collective ability to predict and prevent threats.

Requirements

  • Bachelor's degree in Computer Science, Cybersecurity, Information Security or related field.
  • 1-2 years in a full-time security position, preferably in a SOC environment or security monitoring role.
  • Log Analysis & Correlation: Experience with log analysis, event correlation and understanding of host and network log sources; familiarity with SIEM platforms.
  • Network Security Fundamentals: Proficiency in network security concepts, firewalls and traffic analysis.
  • Operating Systems: Working knowledge of Windows and Linux environments; ability to identify suspicious system behavior.
  • Alert Analysis: Experience with real-time alert investigation and prioritization; ability to distinguish signal from noise.
  • TrendAI familiarity: Working knowledge of the Vision One platform or equivalent threat intelligence/XDR platforms.
  • AI Competence: Fundamental understanding of AI/ML concepts and use cases.
  • Strong aptitude for learning; self-directed and capable of rapidly mastering new tools and threat landscapes.
  • Comfortable thriving in a fast-paced, 24/7 operations environment.
  • Strong written and verbal communication, ability to translate security findings for both technical and non-technical stakeholders
  • Strong analytical and problem-solving skills with ability to work effectively in a global team environment
  • Comfortable speaking to customer via e-mail, chat and phone.

Responsibilities

  • AI-Driven Operations: Contribute to automation and AI initiatives that accelerate alert triage, reduce analyst burden and raise the overall quality and consistency of MDR delivery.
  • Threat Monitoring & Detection: Monitor and analyze security events (Endpoint/Email/Server/Network) using TrendAI Vision One to identify anomalous activities and investigate real-time alerts within customer environments.
  • Alert Triage & Investigation: Prioritize and differentiate between genuine intrusion attempts and false positives; evaluate unknown or suspicious behavior to determine true threat status.
  • Incident Containment: Take rapid measures to contain, eradicate and mitigate threat impact with clear communication to customers.
  • Detection Refinement: Review security events and data sources to develop and refine detection criteria; contribute to improved malware analysis and threat prevention solutions.
  • Customer Communication: Compose detailed security alert notifications with investigation findings, containment actions taken, and actionable recommendations for customers.
  • Threat Hunting: Generate threat intelligence from incident analysis; identify patterns and trends to improve organizational threat posture.

Benefits

  • Comprehensive health benefits and paid time off package
  • Pre-partum, maternity, parental, medical leave and adoption assistance
  • Mental Health Wellness Program & Annual Wellness Incentive
  • 401(k) with company match
  • Pet Insurance
  • Collaborative and innovative culture
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service