Security Operations Analyst II
Roseland, NJ
CoreWeave is the AI Hyperscaler™, delivering a cloud platform of cutting edge services powering the next wave of AI. The company’s technology provides enterprises and leading AI labs with the most performant, efficient and resilient solutions for accelerated computing. Since 2017, CoreWeave has operated a growing footprint of data centers covering every region of the US and across Europe. CoreWeave was ranked as one of the TIME100 most influential companies of 2024.
As the leader in the industry, we thrive in an environment where adaptability and resilience are key. Our culture offers career-defining opportunities for those who excel amid change and challenge. If you’re someone who thrives in a dynamic environment, enjoys solving complex problems, and is eager to make a significant impact, CoreWeave is the place for you. Join us, and be part of a team solving some of the most exciting challenges in the industry.
CoreWeave powers the creation and delivery of the intelligence that drives innovation. To learn more about our values, please visit our careers website.
About the Role
We are seeking a highly skilled Security Operations Analyst II specializing in Incident Response to join our 24x7 security team in our Roseland, New Jersey Security Operations Center. In this role, you will lead critical incident response efforts, perform forensics investigations, and contribute to the improvement of our detection and response capabilities. The ideal candidate will have extensive experience in security operations, with a deep understanding of forensics in Linux, MacOS, and Kubernetes environments.
Key Responsibilities:
- Be part of a 24/7/365 SOC, that includes a rotating on-call schedule for overnights/weekends.
- Lead and manage security incidents, including detection, analysis, containment, and remediation, ensuring rapid response to potential threats across Linux, MacOS, and Kubernetes environments.
- Perform forensics on compromised systems and root cause analysis, with a focus on Linux and MacOS.
- Utilize SIEM, EDR, and other security tools to detect, investigate, and respond to suspicious activity in real-time.
- Conduct post-incident reviews, providing insights and recommendations for improving security defenses.
- Work closely with the threat intelligence team to identify emerging threats and ensure the incident response team is prepared to defend against them.
- Mentor and guide junior security analysts, helping to foster a culture of continuous improvement and knowledge sharing.
- Stay up-to-date with industry best practices, threat landscape trends, and relevant technologies to continually improve the organization’s incident response capabilities.
Required Skills and Qualifications:
- 5+ years of experience in forensics, incident response, or security operations.
- Extensive experience with Linux and MacOS systems, including deep knowledge of system internals, logging, and forensic artifacts.
- Proven ability to perform digital forensics on compromised systems, including data recovery, analysis of malware, and network traffic analysis.
- Experience with Kubernetes and familiarity with securing containerized environments.
- Familiarity with modern security tools and platforms such as SIEM, EDR, IDS/IPS, and firewalls.
- Strong understanding of network protocols, firewalls, VPNs, proxies, and other security technologies.
- Strong analytical skills with the ability to handle and interpret large amounts of data, and the ability to translate these into actionable insights.
- Excellent communication and collaboration skills, with the ability to work effectively in high-pressure situations.
Our compensation reflects the cost of labor across several US geographic markets. The base pay for this position ranges from $115,000-$135,000. Pay is based on a number of factors including market location and may vary depending on job-related knowledge, skills, and experience.
What We Offer
The range we’ve posted represents the typical compensation range for this role. To determine actual compensation, we review the market rate for each candidate which can include a variety of factors. These include qualifications, experience, interview performance, and location.
In addition to a competitive salary, we offer a variety of benefits to support your needs, including:
- Medical, dental, and vision insurance - 100% paid for by CoreWeave
- Company-paid Life Insurance
- Voluntary supplemental life insurance
- Short and long-term disability insurance
- Flexible Spending Account
- Tuition Reimbursement
- Mental Wellness Benefits through Spring Health
- Family-Forming support provided by Carrot
- Paid Parental Leave
- Flexible, full-service childcare support with Kinside
- 401(k) with a generous employer match
- Flexible PTO
- Catered lunch each day in our office and data center locations
- A casual work environment
- A work culture focused on innovative disruption
Our Workplace
At CoreWeave, we are committed to operating as a hybrid workplace, offering employees flexibility in how they structure their time between in-office and remote work. We recognize the significance of fostering connections, collaboration, and creativity within our office culture and its positive impact on our business. Our philosophy operating as a hybrid workplace underscores our dedication to enabling employees to tailor work-life balance to their individual preferences.
For those who do not live within 30 miles of one of our offices, we are open to considering remote work for candidates whose skills and experience strongly align with the role. While we prioritize a hybrid work environment for most roles, we understand the importance of flexibility and are open to remote work for specific positions and specialized skill sets. Onboarding is essential to your success. New employees not based out of an office will be invited to attend onboarding training at one of our hubs within their first month of employment. We continue to foster a collaborative environment by bringing teams together quarterly.
California Consumer Privacy Act - California applicants only
CoreWeave is an equal opportunity employer, committed to fostering an inclusive and supportive workplace. All qualified applicants and candidates will receive consideration for employment without regard to race, color, religion, sex, disability, age, sexual orientation, gender identity, national origin, veteran status, or genetic information.
As part of this commitment and consistent with the Americans with Disabilities Act (ADA), CoreWeave will ensure that qualified applicants and candidates with disabilities are provided reasonable accommodations for the hiring process, unless such accommodation would cause an undue hardship. If reasonable accommodation is needed, please contact: careers@coreweave.com.
ApplyJob Profile
Hybrid workplace
Benefits/PerksCatered lunch Collaborative environment Disability Insurance Dynamic environment Flexible PTO Hybrid work Hybrid workplace Life Insurance Mental wellness benefits Onboarding training Paid parental leave Significant impact Tuition reimbursement Vision Insurance
Tasks- Conduct post-incident reviews
- Continuous Improvement
- Improve detection capabilities
- Lead incident response
- Mentor junior analysts
- Perform forensics investigations
- Support
AI Analysis Analytical Collaboration Communication Continuous Improvement Data analysis Data center EDR Excel Firewalls Forensics IDS Incident Response IPS Kubernetes Linux MacOS Network protocols Onboarding Organization Security Security Operations Security Technologies SIEM
Experience5 years
Education TimezonesAmerica/Anchorage America/Chicago America/Denver America/Los_Angeles America/New_York Pacific/Honolulu UTC-10 UTC-5 UTC-6 UTC-7 UTC-8 UTC-9