Security Operations Analyst II
Roseland, NJ
CoreWeave is the AI Hyperscaler™, delivering a cloud platform of cutting edge services powering the next wave of AI. The company’s technology provides enterprises and leading AI labs with the most performant, efficient and resilient solutions for accelerated computing. Since 2017, CoreWeave has operated a growing footprint of data centers covering every region of the US and across Europe. CoreWeave was ranked as one of the TIME100 most influential companies of 2024.
As the leader in the industry, we thrive in an environment where adaptability and resilience are key. Our culture offers career-defining opportunities for those who excel amid change and challenge. If you’re someone who thrives in a dynamic environment, enjoys solving complex problems, and is eager to make a significant impact, CoreWeave is the place for you. Join us, and be part of a team solving some of the most exciting challenges in the industry.
CoreWeave powers the creation and delivery of the intelligence that drives innovation. To learn more about our values, please visit our careers website.
About the Role
We are seeking a highly skilled Security Operations Analyst II specializing in Incident Response to join our 24x7 security team in our Roseland, New Jersey Security Operations Center. In this role, you will lead critical incident response efforts, perform forensics investigations, and contribute to the improvement of our detection and response capabilities. The ideal candidate will have extensive experience in security operations, with a deep understanding of forensics in Linux, MacOS, and Kubernetes environments.
Key Responsibilities:
- Be part of a 24/7/365 SOC, that includes a rotating on-call schedule for overnights/weekends.
- Lead and manage security incidents, including detection, analysis, containment, and remediation, ensuring rapid response to potential threats across Linux, MacOS, and Kubernetes environments.
- Perform forensics on compromised systems and root cause analysis, with a focus on Linux and MacOS.
- Utilize SIEM, EDR, and other security tools to detect, investigate, and respond to suspicious activity in real-time.
- Conduct post-incident reviews, providing insights and recommendations for improving security defenses.
- Work closely with the threat intelligence team to identify emerging threats and ensure the incident response team is prepared to defend against them.
- Mentor and guide junior security analysts, helping to foster a culture of continuous improvement and knowledge sharing.
- Stay up-to-date with industry best practices, threat landscape trends, and relevant technologies to continually improve the …
This job isn't fresh anymore!
Search Fresh JobsJob Profile
Hybrid workplace
Benefits/PerksCatered lunch Collaborative environment Disability Insurance Dynamic environment Flexible PTO Hybrid work Hybrid workplace Life Insurance Mental wellness benefits Onboarding training Paid parental leave Significant impact Tuition reimbursement Vision Insurance
Tasks- Continuous Improvement
- Lead incident response
- Mentor junior analysts
- Support
AI Analysis Analytical Collaboration Communication Continuous Improvement Data analysis Data center EDR Excel Firewalls Forensics IDS Incident Response IPS Kubernetes Linux MacOS Network protocols Onboarding Organization Security Security Operations Security Technologies SIEM
Experience5 years
Education TimezonesAmerica/Anchorage America/Chicago America/Denver America/Los_Angeles America/New_York Pacific/Honolulu UTC-10 UTC-5 UTC-6 UTC-7 UTC-8 UTC-9