TL;DR
Embedded Detection Analyst (AI/Cybersecurity): Owning end-to-end detection performance for strategic customer accounts and driving measurable improvements in email security, with an accent on understanding attacker TTPs, fine-tuning AI detection engines, and root cause analysis. Focus on systematically diagnosing misclassification patterns, implementing data-driven tuning strategies, and generating impact reports for both technical and non-technical stakeholders.
Location: Remote (USA). Candidates must be eligible to access controlled technology under U.S. export control laws.
Salary: $165,000–$195,000 USD
Company
hirify.global is a product company focused on email security through its AI engine.
What you will do
- Own detection performance for 3-5 strategic customer accounts, ensuring high efficacy of the AI engine.
- Handle high-priority false positive and false negative escalations, performing incident triage and alert correlation.
- Design and implement detection tuning strategies based on customer signals, attack patterns, threat intelligence, and behavioral characteristics.
- Generate and present impact reports demonstrating measurable improvement in detection to customers and internal stakeholders.
- Document detection issues, investigation findings, and tuning approaches for team learning and program improvement.
- Provide feedback to the tooling team to shape the roadmap for detection analysis and tuning tools, leveraging AI.
Requirements
- 2-5 years of experience in SOC operations, detection engineering, incident response, email security analysis, or related cybersecurity roles.
- Experience with security monitoring and detection platforms such as SIEM, EDR, or email security tools.
- Proven experience in email attack analysis, with ability to identify and leverage IOCs and TTPs.
- Deep understanding of precision/recall metrics (true/false negatives, true/false positives) and their business impact.
- Ability to triage security alerts, perform root cause analysis, and tune detection logic to reduce false positives.
- Demonstrated proficiency with AI tools (ChatGPT, Claude, Copilot, or similar) to enhance productivity.
- Experience in technical writing that effectively communicates complex issues to technical and non-technical audiences, particularly customers.
- Proven ability to work directly with customers or stakeholders on technical security issues in collaboration with customer-facing teams.
Nice to have
- Background in email security, phishing detection, anti-abuse systems, or spam analysis.
- Basic SQL knowledge with ability to write simple queries and understand data structures.
- Familiarity with Python, data analysis scripting, or notebook environments (e.g., Databricks, Jupyter).
- Understanding of threat intelligence, IOCs, and threat hunting concepts.
- Familiarity with the MITRE ATT&CK framework and common email attack vectors.
- Security certifications such as Security+, Network+, GIAC, CISSP, or CEH.
Culture & Benefits
- Eligible for a bonus, restricted stock units (RSUs), and comprehensive benefits.
- Individual compensation packages are based on skills, experience, and qualifications.
- Committed to being an equal opportunity employer.
- Secure hiring practices involve video interviews and pre-employment checks.
Будьте осторожны: если вас просят войти в iCloud/Google, прислать код/пароль, запустить код/ПО, не делайте этого - это мошенники. Обязательно жмите "Пожаловаться" или пишите в поддержку. Подробнее в гайде →