Назад
Company hidden
2 дня назад

Senior Cyber Security Analyst (AI)

Формат работы
remote (Global)
Тип работы
fulltime
Грейд
senior
Английский
b2
Страна
Ukraine
Вакансия из списка Hirify.GlobalВакансия из Hirify Global, списка международных tech-компаний
Для мэтча и отклика нужен Plus

Мэтч & Сопровод

Для мэтча с этой вакансией нужен Plus

Описание вакансии

Текст:
/

TL;DR

Senior Cyber Security Analyst (AI): Analyzing and validating investigations completed by AI Agents to understand the full picture of malicious activity with an accent on correlating data from various sources and proactively identifying potential threats. Focus on optimizing and tuning the AI platform, staying current with emerging cybersecurity trends, and collaborating with Engineering and Product teams.

Location: Remote

Company

hirify.global is a custom product engineering company that supports both multinational organizations and scaling startups to solve their most complex business challenges.

What you will do

  • Analyze and validate investigations completed by the AI Agents for accuracy, completeness, and risk.
  • Correlate data from various data sources including cloud, endpoint, identity, network, etc. to understand the full picture of a malicious activity.
  • Investigate malicious activity that the AI Agents responded to and understand the complexity of the attack that was stopped including the risk that was prevented for customers.
  • Use advanced AI Agents to hunt in customer environments to detect and remediate emerging threats, ultimately contributing to detections that will be folded back into the product.
  • Proactively identify potential threats and anomalies in customer environments by reviewing logs and malicious findings.
  • Collaborate with the Engineering and Product teams, providing feedback on the customer experience and assist in optimizing and tuning the AI platform.

Requirements

  • 2+ years of experience in Cyber Security Operations.
  • Hands-on experience with investigating alerts and across multiple sources (endpoint, network, identity, email, cloud, etc.).
  • Strong understanding of security monitoring tools (XDR, SIEM, IDS/IPS, IDP, etc.).
  • Experience analyzing and investigating security alerts from multiple sources, including intrusion detection systems, network monitoring tools, and endpoint protection platforms.
  • Working knowledge of common attack techniques and frameworks (MITRE ATT&CK) and incident triage methodologies.
  • Strong analytical and problem-solving skills, with the ability to verify AI-driven analysis and make independent security decisions.

Nice to have

  • Prior experience in a Managed Services environment.
  • Incident Handling experience.
  • Relevant certifications: Security+, GSEC, GCIH.

Culture & Benefits

  • Work alongside top professionals in a friendly, open-door environment.
  • Take on large-scale projects with a global impact and expand your expertise.
  • Boost your skills with internal events (meetups, conferences, workshops), Udemy access, language courses, and company-paid certifications.
  • Enjoy radical flexibility – work remotely or from an office, your choice.
  • Company-paid medical insurance, mental health support, and financial & legal consultations.

Будьте осторожны: если работодатель просит войти в их систему, используя iCloud/Google, прислать код/пароль, запустить код/ПО, не делайте этого - это мошенники. Обязательно жмите "Пожаловаться" или пишите в поддержку. Подробнее в гайде →