Senior Security Analyst-Falcon NG SIEM experience

23 hours, 35 minutes ago
Full-time
Senior
Cybersecurity
Ivanti

Ivanti

Ivanti provides automated solutions that discover, repair, and secure devices across various locations, enabling employees to work efficiently and securely from anywhere.

Internet Software & Services
1K-5K
Founded 1985
$26M raised

Description

  • Lead and execute security incident response to manage and mitigate threats across Ivanti’s global footprint.
  • Perform threat hunting and advanced incident response to uncover known and unknown threats and attacker TTPs.
  • Conduct thorough investigations and digital forensics for external attacks, insider threats, and complex security events, producing comprehensive reports for stakeholders.
  • Analyze security telemetry from SIEM, EDR, DLP, email threat detection, and cloud platforms (Azure, AWS, GCP) to identify and disrupt threats before impact.
  • Develop detection content and build automation to streamline and improve detection and response capabilities.
  • Provide actionable risk mitigation strategies, recommendations, and documentation to improve Ivanti’s security posture.
  • Coordinate, escalate, and resolve information security events with Senior Threat Analysts, the Incident Response Manager, and Security Architecture teams.
  • Contribute to knowledge sharing and mentorship to build team expertise in modern cyber defense.

Requirements

  • Bachelor’s degree in Information Systems, MIS, Computer Science, Cybersecurity, or a related technical field.
  • 7+ years of experience in cybersecurity incident response, threat hunting, SOC operations, and/or digital forensics in enterprise-scale environments.
  • Experience with Mimecast and Falcon NG‑SIEM is required.
  • Proven proficiency with security platforms and tools including SIEM, EDR, DLP, email security gateways, cloud security (Azure, AWS, GCP), forensic toolsets, and network security solutions.
  • Expertise with Windows, Linux, and Mac operating systems at the filesystem and artifact level.
  • Strong familiarity with the MITRE ATT&CK framework and hands-on experience mapping real-world attacks to ATT&CK techniques.
  • In-depth understanding of anomalous activity, lateral movement, living-off-the-land techniques, and common attacker tradecraft.
  • Excellent organizational skills and time management with the ability to perform in dynamic, fast-paced environments.
  • Exceptional written and verbal communication skills for producing clear reports and guidance for technical and non-technical stakeholders.
  • Proven collaboration skills working with internal and external teams to research and implement countermeasures; industry certifications (e.g., SANS GCIH/GCFA/GNFA, CompTIA CySA+/Security+, EC-Council CEH, or other Blue Team certs) are a plus.

Benefits

  • Remote-friendly work and flexible schedules.
  • Competitive compensation and total rewards including health, wellness, and financial plans for you and your family.
  • Global, diverse teams with collaboration across 23+ countries.
  • Access to learning and development resources and best-in-class training programs.
  • Equity and an inclusive, belonging-focused culture.
  • Accommodations available during the hiring process (contact [email protected]).

Interested in this position?

Apply directly on the company website

Apply Now

Similar Roles

Technology Solutions Analyst

Heartbeat Health 11-50 Health Care Providers & Services

Technology Solutions Analyst at Heartbeat Health (remote) responsible for supporting Cybersecurity and IT operations to ensure secure, reliable corporate technology systems that enable clinicians and staff to deliver high-quality virtual cardiovascular care.

HIPAA macOS
43 minutes ago

Security Analyst

AHEAD 1K-5K IT Services

Security Analyst (SOC) at AHEAD supporting managed security services from Gurugram (remote) responsible for monitoring customer environments and performing incident detection, validation, triage, and reporting to enable timely incident response.

IDS Linux Network Security SIEM
2 days, 1 hour ago

Sr. Forensic Analyst

Kaseya 1K-5K IT Services

Senior Forensic Analyst at Kaseya responsible for leading digital forensic investigations and supporting incident response to triage, analyze, and deliver Incident Response Service Catalog outcomes that protect the organization and its customers.

AWS Azure GCP
2 days, 2 hours ago

Information Security Compliance Coordinator

Contact Government Services 1-10 Professional Services

Part-time Information Security Compliance Coordinator at a Washington, DC–based eDiscovery technology and consulting firm supporting the Director of Compliance to coordinate and execute administrative, documentation, and audit-related activities for ISO 27001, SOC 2, and CMMC to keep compliance efforts organized and on schedule.

3 days, 2 hours ago

You're on a roll! Sign up now to keep applying.

Sign Up

Already have an account? Log in

Used by 14,729+ remote workers