*Location: US-Remote
This position works on a 4x10, 3rd shift (Sunday- Wednesday) + shift differential pay
Position Overview
Vectra is seeking a highly skilled and experienced MDR (Managed Detection and Response) Security Analyst to join our team. As a Sr Security Analyst, you will serve in a critical role in protecting and defending Vectra MDR customer infrastructure. You will be responsible for supervising and analyzing security events, responding to incidents, conducting SOC (Security Operations Center) operations, and assisting MDR customers to ensure their needs are met.
A successful candidate will have sound technical experience and skills, blended with good interpersonal, communication, and project management skills.
Responsibilities
- Monitor security logs and alerts from various sources, including intrusion detection systems, Endpoint Detection and Response (EDR) systems, and security information and event management (SIEM) tools.
- Investigate and analyze security incidents, identify root cause, and develop appropriate mitigation strategies.
- Complete security response actions, including full remote remediation of endpoints.
- Perform threat hunting and proactive analysis to identify potential security risks and vulnerabilities.
- Collaborate with multi-functional teams, including product, engineering, and support, to resolve customer incidents or issues.
- Mentor and provide guidance to junior security analysts, sharing knowledge and standard processes.
- Conduct health checks and architecture reviews, providing technical expertise and real-life experience in creating solutions, designs, and recommendations.
- Be a strong voice for your customers across business to identify new detection models, identify new product features, build content for both internal and external customer knowledge bases, and ensure successful Vectra deployments.
- Travel expected 0-5%
Requirements
- Demonstrable experience as an MDR security analyst, SOC analyst, or similar role in a fast-paced environment.
- Experience providing remote response and remediation activities within networks and on endpoints.
- Solid understanding of intrusion detection systems, artificial intelligence-based attack detection and prevention, incident response methodologies, and SOC operations.
- Experience with SIEM tools, log analysis, network analysis, endpoint analysis, and threat intelligence platforms.
- Solid knowledge of operating systems, networking protocols, and security technologies.
- Proficient in incident handling, threat hunting, and forensics.
- Excellent analytical and problem-solving skills, with the ability to think critically under pressure.
- Good communication skills to effectively collaborate with multi-functional teams and communicate complex security issues to non-technical stakeholders.
- Continuous learning attitude to stay updated with the evolving threat landscape and emerging security technologies.
Desirable
- Prior experience with Vectra, SentinelOne, Microsoft Defender, or CrowdStrike
- Coding experience in Bash, Python, or Powershell
- Open-source development