About The Position

This role is responsible for establishing and maintaining the enterprise-wide IT security infrastructure to ensure the security, integrity, and availability of the company’s information assets. This includes the rigorous application of information security and information assurance policies, principles, and practices, with a strong emphasis on Incident Response readiness and operational execution. The position will lead efforts to detect, analyze, contain, eradicate, and recover from security incidents while continuously improving response processes, tooling, playbooks, and defensive capabilities.

Requirements

  • Bachelor's degree in information systems, or related field, OR 5-7 years of experience in the information security field
  • Relevant Industry certifications such as CISSP, CISM, and AZ-500
  • Demonstrate good judgment in solving problems, identifying problems in advance, and proposing solutions
  • Strong analytical and organizational skills, with attention to detail
  • Demonstrate strong verbal and written communication skills
  • Ability to multi-task, prioritizing multiple objectives and initiatives
  • Able to work in a team environment and with a diverse group
  • Ability to travel up to ~10% of the time, which may include weekends and evenings, as needed
  • Most work is performed in a temperature-controlled environment
  • Incumbent may sit for long periods of time at a desk or computer terminal
  • Incumbent may use calculators, keyboards, telephone and other office equipment in the course of a normal workday
  • Stooping, bending, twisting and reaching may be required in completion of job duties
  • Ability to demonstrate, understand and apply our workplace values.
  • Simplicity (operate) – the drive to identify root cause and innovate to remove complexity to deliver the best outcome
  • Heart (emotion) – the passion that drives you to get up every day and work hard to strive for excellence
  • Performance Excellence (mindset) – clearly defining high expectations, driving ownership of key roles and responsibilities, executing with integrity and emphasis while creating a culture of accountability
  • Respect (philosophy) – taking pride in being inclusive and treating everyone who comes through the doors with respect

Responsibilities

  • Provide efficient and effective Infrastructure Security Operations Support of all supported infrastructure security components
  • Investigate and analyze common security incidents, including malware infections, phishing attempts, unauthorized access, and suspicious network activity.
  • Develop, maintain, and optimize Incident Response playbooks and SOPs to ensure consistent, efficient detection, containment, eradication, and recovery processes.
  • Collaborate closely with the MSSP to refine detection use cases, validate alerts, coordinate response actions, and improve overall SOC effectiveness.
  • Drive containment and remediation efforts during active security events, working with cross‑functional teams to minimize impact and ensure rapid recovery.
  • Support and enhance email security controls, including phishing analysis, message tracing, and mail flow/security policy tuning.
  • Participate in an on‑call rotation to provide timely response during off-hours incidents.
  • Conduct root‑cause analysis and produce post‑incident reports, identifying gaps and recommending improvements to tooling, processes, and security posture.
  • Assist in threat hunting activities to proactively identify emerging threats or abnormal behaviors in the environment.
  • Contribute to continuous improvement of logging, monitoring, and alerting across security platforms.
  • Provide timely and effective maintenance and repair support on all supported infrastructure security components
  • Conduct efficient security monitoring of all supported infrastructure security components to include but not limited to firewalls and intrusion detection/prevention systems
  • Ensure effective change control and configuration management of all supported infrastructure security-related components to establish and maintain consistency of their performance and functional and physical attributes
  • Develop and execute advanced automation and orchestration activities as applicable across several information security domains
  • Some familiarity administering the following technology stack: Splunk, Microsoft Azure and Defender, CheckPoint Firewall/Email, and Imperva WAF.
  • Manage risk identification within the technical architecture in partnership with infrastructure teams
  • Keep abreast of and gain expertise in the evolving technology and understand how new technologies could be applied to our security environment
  • Research, test and understand the relevant products and product capability
  • Participate in the vendor community on relevant products and product capability
  • Work under the guidance from more senior information security engineers
  • Mentors’ junior information security engineers

Benefits

  • 401K company match up to 4%
  • Paid Time Off
  • Medical Insurance options including FSA & HSA
  • Vision Insurance
  • Dental insurance
  • Employee Assistance Programs
  • Team Member Referral Program
  • Tuition Reimbursement
  • Wellbeing Program
  • Career development opportunities

Stand Out From the Crowd

Upload your resume and get instant feedback on how well it matches this job.

Upload and Match Resume

What This Job Offers

Job Type

Full-time

Career Level

Mid Level

Number of Employees

1,001-5,000 employees

© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service