About The Position

The Role GM’s Cybersecurity Team safeguards the company’s global information assets, networks, and infrastructure. Our mission is to proactively defend GM against evolving cyber threats through strategic leadership, technical excellence, and innovative risk management. We seek cybersecurity professionals with advanced expertise, capable of driving enterprise security initiatives and influencing organizational resilience. As a Cyber Detection Incident Analyst on GM’s Security Operations team, you will play a critical role in strengthening the organization’s ability to detect and analyze to advanced cyber threats across a global, hybrid enterprise. You will leverage expertise across endpoint, network, cloud, identity, and application detection technologies to identify malicious activity, improve alert fidelity, and enhance the platforms and workflows that drive GM’s cyber detection mission. In this role, you will lead high-impact investigations, develop and refine detection logic across SIEM, EDR, NDR, SOAR, and cloud-native security tools, and apply threat intelligence to strengthen GM’s detection posture. You will also partner closely with many teams across Cyber Security and GM to improve visibility, analytics, automation, and investigative efficiency across Security Operations. This position requires deep technical analysis, designing and tuning high-efficacy detections, leading incident escalation workflows, and collaborating across the broader security organization to ensure resilient, scalable, and modern detection coverage. You will mentor analysts, guide detection strategy, influence tooling roadmaps, and help integrate emerging technologies, including automation and AI, to reduce manual workload and improve detection maturity.

Requirements

  • Bachelor’s degree in Information Security, Computer Science, Information Systems, or equivalent experience.
  • 5+ years of experience in cybersecurity with a focus on detection engineering, security operations, incident response, intrusion detection, or security event analysis.
  • Strong analytical and investigative skills with the ability to interpret complex datasets and communicate findings effectively.
  • Ability to create tactical scripts (Python, PowerShell, KQL, Bash, etc.) to supplement investigative workflows and enrich detections.
  • Experience with network security monitoring (IDS, packet capture, flow analysis) and proper techniques for identifying and responding to security events.
  • Experience detecting threats in cloud environments (Azure, AWS, GCP) and using cloud-native detection tooling.
  • Strong collaboration and communication skills with focus on cross-team partnerships.
  • Demonstrated ability to mentor other analysts, contribute to team development, and work effectively in a collaborative team environment.
  • Deep knowledge of SIEM technologies, log‑centric analytics, and correlation logic.
  • Deep knowledge of EDR platforms and behavioral-based detection methodologies.

Nice To Haves

  • Industry certifications such as GCIA, GCIH, AWS/Azure/GCP security certifications, or equivalent.
  • 7+ years of experience in cyber incident detection, threat hunting, or security operations.
  • Experience with vehicle security, automotive architectures, or embedded security telemetry.
  • Experience supporting manufacturing or OT security environments.
  • Experience with application security, runtime and application telemetry, CI/CD pipelines, and API abuse detection.
  • Experience leading security projects and incident response initiatives.
  • Malware analysis.

Responsibilities

  • Conduct expert-level triage and deep-dive analysis of security events using EDR, NDR, identity telemetry, application logs, SIEM analytics, SOAR workflows, and cloud-native security tools.
  • Lead incident escalation workflows and collaborate with the Incident Response and other partner teams drive timely containment and resolution of security threats.
  • Perform proactive threat hunting across endpoints, networks, identity systems, cloud platforms (Azure, AWS, GCP), and SaaS environments using threat intelligence, behavioral analytics, and TTP/IOC research.
  • Correlate telemetry across diverse systems to identify sophisticated attack patterns.
  • Apply strong understanding of OS internals, cloud architectures, networking, authentication protocols, and adversary tradecraft to assess risk, determine impact, and drive escalation decisions.
  • Integrate threat intelligence (IOCs, behavioral patterns, ATT&CK-aligned TTPs) into detection logic, use cases, and hunt strategies.
  • Develop, tune, and maintain high-efficacy detections across: SIEM: correlation rules, anomaly detection, enrichment logic EDR/XDR: behavioral detections, process analytics, custom rules NDR: network anomaly detection, lateral movement patterns SOAR: automation workflows, enrichment routines Cloud-native tools: Azure Defender, AWS GuardDuty, GCP SCC SaaS platforms: O365, API-based telemetry
  • Evaluate emerging detection technologies, analytics methods, and research findings to improve visibility, reduce MTTD, and optimize analyst efficiency.
  • Act as a technical detection lead by mentoring analysts, reviewing escalations, and driving consistency in detection quality and workflows.
  • Support 24×7 monitoring as part of an on‑call rotation.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service