Назад
Company hidden
21 час назад

Security Analyst III (Cybersecurity)

100 000 - 130 000$
Тип работы
fulltime
Грейд
senior
Английский
b2
Страна
US
Вакансия из списка Hirify.GlobalВакансия из Hirify Global, списка международных tech-компаний
Для мэтча и отклика нужен Plus

Мэтч & Сопровод

Для мэтча с этой вакансией нужен Plus

Описание вакансии

Текст:
/

TL;DR

Security Analyst III (Cybersecurity): Leading complex security incidents and enhancing the Security Operations Center's capabilities with an accent on incident command, cloud security, and operational maturity. Focus on optimizing detection coverage, mentoring incident response teams, and translating threat intelligence into proactive defenses.

Location: United States

Salary: $100,000 – $130,000

Company

hirify.global is building a definitive platform for intentional living, connecting people with inspiring experiences in fitness, wellness, and beyond.

What you will do

  • Lead complex security incidents as incident commander from detection through resolution.
  • Mentor the incident response team on advanced IC techniques, stakeholder management, and after-action reviews.
  • Serve as the technical escalation point for investigations in cloud security, application security, and modern adversary techniques.
  • Proactively identify and fix operational gaps, establish SOC metrics, and optimize MSSP partnerships.
  • Improve detection coverage by conducting post-incident analysis and mapping gaps to the MITRE ATT&CK framework.
  • Conduct threat-informed activities including hypothesis-driven threat hunts and operationalizing threat intelligence.

Requirements

  • 7–10+ years in security operations with proven experience leading complex, multi-team security incidents.
  • Strong cloud security knowledge (AWS, Azure, or GCP), including architecture, IAM, and attack patterns.
  • Expert investigation skills across SIEM (Google Chronicle) and EDR (CrowdStrike).
  • Demonstrated ability to mentor analysts and elevate team technical capabilities.
  • Expertise in the MITRE ATT&CK framework and understanding of modern adversary techniques.
  • Must be based in the United States.

Nice to have

  • Experience in detection engineering or SIEM rule writing.
  • Proficiency in threat hunting methodologies and frameworks.
  • Scripting and automation skills using Python or PowerShell.
  • Knowledge of application security fundamentals.
  • Certifications such as GIAC (GCIA, GCIH, GCFA) or CISSP.

Culture & Benefits

  • Competitive and fair compensation based on skill set and experience.
  • High autonomy with the opportunity to directly shape how the SOC operates.
  • Performance bonus and other incentive compensation plans.
  • Inclusive workplace environment that values diversity and authentic self-expression.
  • Comprehensive benefits package.

Будьте осторожны: если работодатель просит войти в их систему, используя iCloud/Google, прислать код/пароль, запустить код/ПО, не делайте этого - это мошенники. Обязательно жмите "Пожаловаться" или пишите в поддержку. Подробнее в гайде →