At-Bay

Related companies:

Jobs at this company:

Apply

📍 USA

🔍 Insurance x Cybersecurity

  • Hands-on experience with enterprise cybersecurity platforms such as SIEM, SOAR, DLP, EDR, cloud security, and more.
  • Experience in IT operations (NOC or SOC) and a minimum of 2 years in cybersecurity engineering or 1 year in automation workflows.
  • Proficiency in one or more scripting languages like Python, JavaScript, or Ruby.
  • Preferred bachelor's degree in computer science, cybersecurity, or related fields.
  • A mix of experience in security operations, engineering, cloud security, and automation, plus knowledge of DevOps and CI tools.

  • Collaborating with team members to identify opportunities for workflow automation.
  • Developing custom automation solutions, including workflows and scripts.
  • Implementing, testing, and maintaining automation solutions.
  • Creating user documentation and handing off solutions to delivery teams.
  • Developing automation playbooks for various detection and response use cases.

AWSPythonAgileCybersecurityGCPJavascriptJenkinsRubySalesforceJavaScriptAzureAgile methodologiesDevOpsDocumentation

Posted 2024-11-23
Apply
Apply

📍 USA

💸 80000 - 110000 USD per year

🔍 Insurance and Cybersecurity

  • Bachelor’s degree or equivalent.
  • Minimum of 2 years of experience in cybersecurity operations, incident response, or another security discipline.
  • Willingness to travel as needed.
  • Previous EDR, MDR, XDR, security monitoring, or incident response experience.
  • Strong oral and written communication skills.
  • Experience performing security operations with various endpoint and network tools.
  • Familiarity with deployment, tuning, and operation of security tools from vendors like CrowdStrike and SentinelOne.
  • Experience with SIEM or similar tools for security data analysis.
  • Skills in analyzing potential indicators of compromise, rapid response to incidents, and cyber threat intelligence.

  • Operation and tuning of security monitoring tools including EDR, network monitoring, email security, DLP, SIEM, and security automation tools.
  • Identification and analysis of anomalous activity in customer technology environments.
  • Triage of event data to identify potential indicators of compromise.
  • Escalation of potentially malicious activity to engage incident responders.
  • Participation in incident investigation, containment, remediation, and recovery activities.
  • Developing and maintaining relationships with customers for MDR service delivery.
  • Developing and delivering reports on identified activity to customer stakeholders.

AWSCloud ComputingCybersecurityGCPMicrosoft AzureAmazon Web ServicesAzureCommunication SkillsAnalytical SkillsCollaborationProblem SolvingAttention to detailOrganizational skillsPresentation skillsTime ManagementWritten communication

Posted 2024-11-14
Apply