Logo
Tailored Brands, Inc.

Sr Information Security Analyst

Tailored Brands, Inc., Houston, Texas, United States, 77246

Save Job

Overview

Sr Information Security Analyst role at Tailored Brands, Inc. The Senior Information Security Analyst serves as a technical lead within the Security Operations Center (SOC), responsible for managing complex security incidents and escalations. This role includes providing expert-level analysis, mentoring junior team members, and enhancing SOC capabilities through process optimization, playbook development, and automation of detection and incident response workflows. The ideal candidate is a self-starter with deep technical expertise who thrives in complex environments, operates independently, and is capable of guiding SOC strategy through both operational response and technical engineering. What you’ll do

The Senior Information Security Analyst serves as a technical lead within the SOC, responsible for managing complex security incidents and escalations. This role includes providing expert-level analysis, mentoring junior team members, and enhancing SOC capabilities through process optimization, playbook development, and automation of detection and incident response workflows. Key Responsibilities

Threat Detection, Hunting & Response Lead complex investigations across endpoints, networks, cloud environments, and SaaS platforms. Perform advanced threat hunting using hypothesis-driven approaches and frameworks such as MITRE ATT&CK. Develop custom queries and detections (KQL, Splunk, Sigma, etc.) to close detection gaps. Conduct forensic analysis (endpoint, memory, network, and log artifacts). Serve as final escalation point for SOC incidents. Detection Engineering & Automation Design, implement, and optimize SIEM/SOAR detections and response playbooks. Build and maintain custom detection logic and integrations (via APIs, automation scripts, and CI/CD pipelines). Automate repetitive SOC tasks with Python, PowerShell, or equivalent. Engineer detection coverage for Microsoft Defender XDR, Sentinel, and other enterprise security platforms. Leadership & Mentorship Act as technical team lead within the SOC, providing direction and escalation support. Mentor and train Tier 1 and Tier 2 analysts on hunting, detection, and incident handling. Contribute to SOC documentation, runbooks, and playbook development. Represent the SOC in cross-functional meetings and incident post-mortems. Continuous Improvement & Metrics Partner with Security Engineering, IAM, and IT to improve monitoring, workflows, and detections. Evaluate logging and telemetry coverage; identify and remediate visibility gaps. Support SOC metrics (MTTD, MTTR, dwell time, false positive rates) and operational KPIs. Drive adoption of modern security practices aligned with Zero Trust, NIST CSF, and CISA ZTMM frameworks. Required Qualifications

8+ years of experience in cybersecurity, with emphasis on SOC, detection engineering, or incident response. Bachelor’s degree in a related field. Strong expertise with Microsoft Sentinel and Defender XDR (Endpoint, Identity, Cloud, Office). Entra ID (PIM, Conditional Access, ITDR). Hands-on experience with cloud and hybrid infrastructure monitoring across Microsoft 365, Entra, Google Cloud, AWS, and on-prem Active Directory. Proficiency with scripting and automation using Python, PowerShell, Bash, and JavaScript. Expertise in query languages such as Kusto Query Language (KQL). Advanced knowledge of MITRE ATT&CK, threat hunting methodologies, and digital forensics. Strong understanding of Windows, macOS, Linux, AD and Entra ID; working knowledge of mobile platforms (Android, iOS, ChromeOS). Proven ability to act as a mentor, technical lead, and escalation point for junior SOC staff. Excellent communication skills for executive reporting and technical documentation. Preferred Qualifications

Experience with SailPoint, PAM (Delinea), NAC (Aruba ClearPass), Cribl Stream, and Palo Alto firewalls/VPN. Familiarity with Microsoft Purview (DLP, Insider Risk) and SaaS monitoring integrations. Knowledge of NIST CSF v2, CIS Controls v8, PCI DSS v4, HIPAA, GDPR, CCPA. Certifications: Microsoft SC-200, GIAC (GCIA, GCIH, GCFA, GDAT), OSCP/OSEP, CISSP or CISM (leadership track). Key Competencies

Self-Starter: Operates independently, drives initiatives without waiting for direction. Analytical Rigor: Strong investigative skills and methodical incident handling. Engineering Mindset: Builds scalable, automated detection and response solutions. Leadership: Guides analysts, influences SOC direction, and acts as deputy to SOC Manager when required. Collaboration: Works effectively with IT, IAM, Security Engineering, GRC, and Architecture teams. If you see yourself in this role, but fall short in any areas above, apply anyway! We love to invest in our team members! About Tailored Brands

Tailored Brands is North America’s leading specialty retailer of menswear, with brands including Men’s Wearhouse, Jos. A. Bank, K&G Fashion Superstore, and Moores Clothing for Men. We are focused on a 3-year journey to Legendary, supported by a strong technology foundation and a large, empowered team. Benefits

This role is eligible for healthcare (medical, dental, vision), retirement savings (401k with company match), life, accident and disability insurance, paid time off, wellbeing program, and other benefits. For detailed information go to mytbtotalrewards.com. Work Environment

Hours are typically 40 per week, hybrid from our Houston, TX office. Other work-life resources and programs are available to support employees.

#J-18808-Ljbffr