Security Analyst, Managed Detection & Response
Remote (US)
Why you should join our At-Bay Security team:
At-Bay is a fast-growth InsurSec company (Insurance x Cybersecurity) on a mission to bring innovative products to the market that help protect small businesses from digital risks. As an InsurSec provider, we uniquely combine insurance with mission-critical security technologies, threat intelligence, and human expertise, to bridge the critical security capability gap that exists among SMBs in the community. We believe InsurSec is an $80B market opportunity and we are excited to introduce the Security Analyst (MDR) role to the security team in order to help expand our reach and influence in the business and security community, of which we serve 35,000 customers.
With At-Bay, our customers experience 5X fewer ransomware attacks. This is just the tip of the iceberg! Click here to learn more about what we're building.
Security Analysts provide first-line security monitoring services to At-Bay’s Managed Detection & Response customers with specific responsibilities including:
- Operation and tuning of security monitoring tools including Endpoint Detection & Response (EDR), network monitoring, email security, Data Loss Prevention (DLP), Security Information and Event Management (SIEM), security automation tools, and others as needed
- Identification and analysis of anomalous activity in customer technology environments
- Triage of event data to identity potential indicators of compromise
- Escalation of potentially malicious activity to engage incident responders where necessary
- Participation in incident investigation, containment, remediation, and recovery activities where necessary
- Developing and maintaining customer relationships to facilitate delivery of MDR services
- Developing and delivering reports on identified activity to customer stakeholders as needed
Key skills
- Previous EDR, MDR, XDR, security monitoring, or incident response experience
- Strong oral and written communications skills
- Previous hands-on experience performing security operations including several of the following:
- Security monitoring using a variety of endpoint and network tools
- Deployment, tuning, and operation of security tools from vendors such as CrowdStrike, SentinelOne, and others
- Deployment, tuning, and operation of SIEM or other tools used to aggregate and analyze security-relevant data
- Triage and analysis of potential indicators of compromise
- Performing rapid response to contain and/or remediate potentially malicious activity
- Development and analysis of cyber threat intelligence
- Participation in investigations involving digital evidence
- Intrusion detection / cyber threat hunting
- Malware analysis
- Previous hands-on experience working in information technology operations (e.g., Network Operations Center, Security Operations Center, Incident Response Team, etc.)
Minimum requirements
- Bachelor’s degree or equivalent
- Minimum of 2 years of experience in cybersecurity operations, incident response, or another security discipline
- Willingness to travel as needed to perform job functions
Preferred requirements
- Significant undergraduate or graduate coursework in computer science, computer engineering, information systems, or cybersecurity
- Preferred candidates will have a mix of cybersecurity experience including either security operations or security engineering / architecture
- Knowledge of cloud environments including knowledge of cloud security products and services offered by major cloud service providers (e.g., AWS, Azure, Google)
- One or more industry cybersecurity certifications (e.g., GCIH, Security+, CISSP, etc.)
Work location
- USA, nationwide
Our estimated base pay range for this role is $80,000-$110,000 per year. Base salary is determined by a variety of factors including but not limited to market data, location, internal equitability, domain knowledge, experiences and skills. In general, if the position sparks your interest we encourage you to apply - our team prioritizes talent.
#LI-CK1
ApplyJob Profile
- Customer relationship management
- Incident investigation
- Incident response
- Report delivery
- Security monitoring
- Triage event data
Cloud Security Cybersecurity Cyber threat intelligence Data Loss Prevention EDR Email Security Incident Investigation Incident Response Intrusion Detection Malware Analysis MDR Network Monitoring Network Operations Ransomware Security Automation Security Monitoring Security Operations SIEM Threat Hunting Threat Intelligence XDR
Experience2 years
EducationBachelor's degree Computer Engineering Computer Science Cybersecurity Information Systems Technology
Certifications TimezonesAmerica/Anchorage America/Chicago America/Denver America/Los_Angeles America/New_York Pacific/Honolulu UTC-10 UTC-5 UTC-6 UTC-7 UTC-8 UTC-9