Find your dream job faster with JobLogr
AI-powered job search, resume help, and more.
Try for Free
TAXWELL

TAXWELL

via Remote Rocketship

Apply Now
All our jobs are verified from trusted employers and sources. We connect to legitimate platforms only.

Senior Security Ops Analyst – Incident Response

Anywhere
full-time
Posted 10/11/2025
Verified Source
Key Skills:
Information systems security
Cloud environments (Azure, AWS)
Container services and Kubernetes
Azure Monitor and Sentinel
Active Directory and Entra ID
PowerShell and Python scripting
Threat hunting and incident response
Digital forensics

Compensation

Salary Range

$100K - 140K a year

Responsibilities

Manage and respond to security incident escalations, mentor analysts, perform threat hunting, conduct forensic analysis, and improve detection processes.

Requirements

Bachelor's degree or CISSP, 5+ years in information systems security, cloud and scripting experience, strong communication and problem-solving skills.

Full Description

Description: • Receive incident escalations from monitoring team and assist with real-time advanced analysis, response, and reporting • Mentor and assist in training analysts to aid in their skills development and analytical capabilities • Proactively hunt for threats and enacting identification, containment, and eradication measures while supporting recovery efforts • Point person for coordination with appropriate parties during a security incident – client, management, legal, security, operations, etc • Create thorough reports and documentation of all incidents and procedures, presenting findings to team and leadership on a routine basis • Supports detection capabilities and refines process through alert validation • Performs threat hunting and proactive incident response • Completes follow-through to ensure quality forensic materials are captured, preserved and documented along with details and timelines of events and recommendations to avoid future occurrences • Assist in the general maintenance and improvement of processes and/or playbooks • Conduct research regarding the latest methods, tools, and trends in digital forensics analysis • Conduct analysis using logs, previous alerts, etc. to identify trends to identify and prevent potential incidents • Ingest data from multiple sources and aggregate client metrics Requirements: • Bachelor's degree or equivalent combination of CISSP certification and prior experience • Five or more years of experience in information systems security • Good communication skills to interact with clients, team members, management, and support personnel • Good analytical and problem-solving skills • Ability to work independently and as part of a team, be highly self-motivated • Experience with cloud environments, such as Microsoft Azure and Amazon Web Services; Container services and Kubernetes; Azure Monitor and/or Sentinel • Experience with AD and Entra ID; Mimecast and Microsoft Purview; Microsoft OpenAI Services; AWS technologies such as EC2, ECS, Lambdas, LightSail, and VMware Cloud • Ability to script in PowerShell, Python Benefits: • Health insurance • Competitive salary • Flexible working hours • Professional development • Paid time off • Remote work options

This job posting was last updated on 10/14/2025

Ready to have AI work for you in your job search?

Sign-up for free and start using JobLogr today!

Get Started »
JobLogr badgeTinyLaunch BadgeJobLogr - AI Job Search Tools to Land Your Next Job Faster than Ever | Product Hunt