Senior Cybersecurity Analyst enhancing detection and response capabilities at Insulet, focusing on threat detection and incident response.
Responsibilities
Lead the design, development, and continuous improvement of detection engineering use cases across SIEM, EDR, and cloud security platforms.
Develop, tune, and validate detection logic aligned to adversary tactics, techniques, and procedures (TTPs), leveraging frameworks such as MITRE ATT&CK.
Integrate and operationalize cyber threat intelligence to enhance detection coverage, threat hunting, and incident response prioritization.
Serve as a technical lead during high-severity security incidents, performing advanced investigation, containment, and remediation activities.
Conduct proactive threat hunting to identify malicious activity that bypasses automated detections.
Partner with security engineering and architecture teams to influence and improve defensive security architecture across endpoint, identity, network, and cloud environments.
Support and participate in penetration testing and purple team exercises, translating offensive findings into actionable defensive improvements and detections.
Develop and maintain incident response playbooks, detection documentation, and investigative runbooks.
Provide expert guidance and mentorship to SOC analysts, elevating overall team capability.
Collaborate with IT, cloud, infrastructure, and application teams to remediate vulnerabilities and reduce systemic risk.
Contribute to SOC maturity initiatives including automation, tooling optimization, and operational process improvements.
Requirements
7+ years of demonstrated experience in cybersecurity operations, including SOC, detection engineering, or incident response roles.
Proven expertise with SIEM platforms such as Splunk, QRadar, Microsoft Sentinel, or similar technologies.
Extensive experience with EDR/XDR platforms such as Microsoft Defender, CrowdStrike, Carbon Black, Sophos, or equivalent.
Strong background in incident response, including forensic analysis, malware investigation, and root-cause determination.
Hands-on experience applying penetration testing techniques or supporting red/purple team exercises.
Advanced understanding of attacker tradecraft, adversary behavior, and kill chain methodologies.
Experience influencing or designing defensive security architecture across enterprise environments.
Strong scripting or query skills (e.g., KQL, SPL, Python, PowerShell).
Excellent analytical, communication, and technical documentation skills.
SOC Analyst L2 responsible for managing and analyzing security incidents in digital transformation. Contributing directly to the protection of companies and infrastructures.
Senior Manager leading global IT security operations to protect company data and assets at Keenova. Overseeing incident response, monitoring, and cybersecurity capabilities with strategic oversight.
Security Operations Center leader at Woven by Toyota, managing triage and response to security alerts in Japan. Collaborating with global SOCs to ensure 24/7 operations.
GSOC Analyst responsible for security operations at Paramount Studios. Developing workflows, incident response, and risk monitoring in a dynamic team environment.
Security Operations Analyst at Orion Health focusing on monitoring and maintaining security tools while collaborating with teams. Engaging with real - world threats and enhancing operational security processes.
Senior Global Security Analyst overseeing physical security operations at Dolby’s San Francisco headquarters. Collaborating with global partners to strengthen safety systems across Dolby locations.
Security Operations Engineer protecting Notion’s systems and users by investigating and responding to security events. Collaborating with a global team to enhance security processes and protocols.