At-Bay
Security Analyst, Managed Detection & Response
At-Bay, Myrtle Point, Oregon, United States, 97458
Overview
Why you should join our At-Bay Managed Detection and Response Security team:
At-Bay is a fast-growth InsurSec company (Insurance x Cybersecurity) on a mission to bring innovative products to the market that help protect small businesses from digital risks. As an InsurSec provider, we uniquely combine insurance with mission-critical security technologies, threat intelligence, and human expertise, to bridge the critical security capability gap that exists among SMBs in the community. We believe InsurSec is an $80B market opportunity and we are excited to introduce the Security Analyst (MDR) role to the security team in order to help expand our reach and influence in the business and security community, of which we serve 35,000 customers.
With At-Bay, our customers experience 5X fewer ransomware attacks. This is just the tip of the iceberg! Click here to learn more about what we're building.
Security Analysts provide first-line security monitoring services to At-Bay’s Managed Detection & Response customers with specific responsibilities including:
Responsibilities
Operation and tuning of security monitoring tools including Endpoint Detection & Response (EDR), network monitoring, email security, Data Loss Prevention (DLP), Security Information and Event Management (SIEM), security automation tools, and others as needed
Identification and analysis of anomalous activity in customer technology environments
Triage of event data to identity potential indicators of compromise
Escalation of potentially malicious activity to engage incident responders where necessary
Participation in incident investigation, containment, remediation, and recovery activities where necessary
Developing and maintaining customer relationships to facilitate delivery of MDR services
Developing and delivering reports on identified activity to customer stakeholders as needed
Key Skills
Previous EDR, MDR, XDR, security monitoring, or incident response experience
Strong oral and written communications skills
Previous hands-on experience performing security operations including several of the following:
Security monitoring using a variety of endpoint and network tools
Deployment, tuning, and operation of security tools from vendors such as CrowdStrike, SentinelOne, and others
Deployment, tuning, and operation of SIEM or other tools used to aggregate and analyze security-relevant data
Triage and analysis of potential indicators of compromise
Performing rapid response to contain and/or remediate potentially malicious activity
Development and analysis of cyber threat intelligence
Participation in investigations involving digital evidence
Intrusion detection / cyber threat hunting
Malware analysis
Previous hands-on experience working in information technology operations (e.g., Network Operations Center, Security Operations Center, Incident Response Team, etc.)
Minimum Requirements
Bachelor’s degree or equivalent
Minimum of 2 years of experience in cybersecurity operations, incident response, or another security discipline
Willingness to travel as needed to perform job functions
Preferred Requirements
Significant undergraduate or graduate coursework in computer science, computer engineering, information systems, or cybersecurity
Preferred candidates will have a mix of cybersecurity experience including either security operations or security engineering / architecture
Knowledge of cloud environments including knowledge of cloud security products and services offered by major cloud service providers (e.g., AWS, Azure, Google)
One or more industry cybersecurity certifications (e.g., GCIH, Security+, CISSP, etc.)
Work Location
USA, nationwide
Our estimated base pay range for this role is $80,000-$110,000 per year. Base salary is determined by a variety of factors including but not limited to market data, location, internal equitability, domain knowledge, experiences and skills. In general, if the position sparks your interest we encourage you to apply - our team prioritizes talent.
#LI-CK1
#J-18808-Ljbffr
At-Bay is a fast-growth InsurSec company (Insurance x Cybersecurity) on a mission to bring innovative products to the market that help protect small businesses from digital risks. As an InsurSec provider, we uniquely combine insurance with mission-critical security technologies, threat intelligence, and human expertise, to bridge the critical security capability gap that exists among SMBs in the community. We believe InsurSec is an $80B market opportunity and we are excited to introduce the Security Analyst (MDR) role to the security team in order to help expand our reach and influence in the business and security community, of which we serve 35,000 customers.
With At-Bay, our customers experience 5X fewer ransomware attacks. This is just the tip of the iceberg! Click here to learn more about what we're building.
Security Analysts provide first-line security monitoring services to At-Bay’s Managed Detection & Response customers with specific responsibilities including:
Responsibilities
Operation and tuning of security monitoring tools including Endpoint Detection & Response (EDR), network monitoring, email security, Data Loss Prevention (DLP), Security Information and Event Management (SIEM), security automation tools, and others as needed
Identification and analysis of anomalous activity in customer technology environments
Triage of event data to identity potential indicators of compromise
Escalation of potentially malicious activity to engage incident responders where necessary
Participation in incident investigation, containment, remediation, and recovery activities where necessary
Developing and maintaining customer relationships to facilitate delivery of MDR services
Developing and delivering reports on identified activity to customer stakeholders as needed
Key Skills
Previous EDR, MDR, XDR, security monitoring, or incident response experience
Strong oral and written communications skills
Previous hands-on experience performing security operations including several of the following:
Security monitoring using a variety of endpoint and network tools
Deployment, tuning, and operation of security tools from vendors such as CrowdStrike, SentinelOne, and others
Deployment, tuning, and operation of SIEM or other tools used to aggregate and analyze security-relevant data
Triage and analysis of potential indicators of compromise
Performing rapid response to contain and/or remediate potentially malicious activity
Development and analysis of cyber threat intelligence
Participation in investigations involving digital evidence
Intrusion detection / cyber threat hunting
Malware analysis
Previous hands-on experience working in information technology operations (e.g., Network Operations Center, Security Operations Center, Incident Response Team, etc.)
Minimum Requirements
Bachelor’s degree or equivalent
Minimum of 2 years of experience in cybersecurity operations, incident response, or another security discipline
Willingness to travel as needed to perform job functions
Preferred Requirements
Significant undergraduate or graduate coursework in computer science, computer engineering, information systems, or cybersecurity
Preferred candidates will have a mix of cybersecurity experience including either security operations or security engineering / architecture
Knowledge of cloud environments including knowledge of cloud security products and services offered by major cloud service providers (e.g., AWS, Azure, Google)
One or more industry cybersecurity certifications (e.g., GCIH, Security+, CISSP, etc.)
Work Location
USA, nationwide
Our estimated base pay range for this role is $80,000-$110,000 per year. Base salary is determined by a variety of factors including but not limited to market data, location, internal equitability, domain knowledge, experiences and skills. In general, if the position sparks your interest we encourage you to apply - our team prioritizes talent.
#LI-CK1
#J-18808-Ljbffr