Назад
Company hidden
2 часа назад

Embedded Detection Analyst (AI/Cybersecurity)

165 000 - 195 000$
Формат работы
remote (только USA)
Тип работы
fulltime
Грейд
middle
Английский
b2
Страна
US
Вакансия из списка Hirify.GlobalВакансия из Hirify Global, списка международных tech-компаний
Для мэтча и отклика нужен Plus

Мэтч & Сопровод

Для мэтча с этой вакансией нужен Plus

Описание вакансии

Текст:
/

TL;DR

Embedded Detection Analyst (AI/Cybersecurity): Owning end-to-end detection performance for strategic customer accounts and driving measurable improvements in email security, with an accent on understanding attacker TTPs, fine-tuning AI detection engines, and root cause analysis. Focus on systematically diagnosing misclassification patterns, implementing data-driven tuning strategies, and generating impact reports for both technical and non-technical stakeholders.

Location: Remote (USA). Candidates must be eligible to access controlled technology under U.S. export control laws.

Salary: $165,000–$195,000 USD

Company

hirify.global is a product company focused on email security through its AI engine.

What you will do

  • Own detection performance for 3-5 strategic customer accounts, ensuring high efficacy of the AI engine.
  • Handle high-priority false positive and false negative escalations, performing incident triage and alert correlation.
  • Design and implement detection tuning strategies based on customer signals, attack patterns, threat intelligence, and behavioral characteristics.
  • Generate and present impact reports demonstrating measurable improvement in detection to customers and internal stakeholders.
  • Document detection issues, investigation findings, and tuning approaches for team learning and program improvement.
  • Provide feedback to the tooling team to shape the roadmap for detection analysis and tuning tools, leveraging AI.

Requirements

  • 2-5 years of experience in SOC operations, detection engineering, incident response, email security analysis, or related cybersecurity roles.
  • Experience with security monitoring and detection platforms such as SIEM, EDR, or email security tools.
  • Proven experience in email attack analysis, with ability to identify and leverage IOCs and TTPs.
  • Deep understanding of precision/recall metrics (true/false negatives, true/false positives) and their business impact.
  • Ability to triage security alerts, perform root cause analysis, and tune detection logic to reduce false positives.
  • Demonstrated proficiency with AI tools (ChatGPT, Claude, Copilot, or similar) to enhance productivity.
  • Experience in technical writing that effectively communicates complex issues to technical and non-technical audiences, particularly customers.
  • Proven ability to work directly with customers or stakeholders on technical security issues in collaboration with customer-facing teams.

Nice to have

  • Background in email security, phishing detection, anti-abuse systems, or spam analysis.
  • Basic SQL knowledge with ability to write simple queries and understand data structures.
  • Familiarity with Python, data analysis scripting, or notebook environments (e.g., Databricks, Jupyter).
  • Understanding of threat intelligence, IOCs, and threat hunting concepts.
  • Familiarity with the MITRE ATT&CK framework and common email attack vectors.
  • Security certifications such as Security+, Network+, GIAC, CISSP, or CEH.

Culture & Benefits

  • Eligible for a bonus, restricted stock units (RSUs), and comprehensive benefits.
  • Individual compensation packages are based on skills, experience, and qualifications.
  • Committed to being an equal opportunity employer.
  • Secure hiring practices involve video interviews and pre-employment checks.

Будьте осторожны: если вас просят войти в iCloud/Google, прислать код/пароль, запустить код/ПО, не делайте этого - это мошенники. Обязательно жмите "Пожаловаться" или пишите в поддержку. Подробнее в гайде →