Cybersecurity Analyst

TENEX.AI

5h ago 0 views 0 applications
Kansas City Metro Onsite
Competitive
Full-time
Security Analyst

Job Description

Cybersecurity Analyst - Join the AI-Powered Security Revolution!

Location: Overland Park, KS
Position Type: Full-Time (Day and Night Shifts Available)

Ready to be at the forefront of cybersecurity innovation? TENEX.AI is an AI-native Managed Detection and Response (MDR) provider, revolutionizing how organizations defend against cyber threats. We're not just another security vendor; we're a force multiplier, empowering defenders with advanced threat detection, rapid response, and continuous protection, all driven by AI and automation.

Backed by Andreessen Horowitz and industry pioneers, we're a fast-growing startup offering a unique opportunity to shape our culture and make a real impact. Join us on the ground floor and be part of a well-funded team that's redefining the cybersecurity landscape. Limited risk, unlimited upside – are you in?

About the Role

As a Cybersecurity Analyst in our Security Operations Center (SOC), you'll be a critical player in safeguarding our clients' digital infrastructure. You'll leverage your deep understanding of cybersecurity, combined with cutting-edge AI/ML technologies – particularly Google's SecOps platform (including Google Chronicle) – to detect, analyze, and respond to security incidents with unparalleled speed and precision. If you're passionate about threat hunting and incident response using the latest AI-powered tools, this is your chance to shine.

What You'll Do:
Threat Monitoring & Detection:
Monitor security alerts and events across enterprise networks, utilizing both traditional security tools and AI/ML-powered threat detection systems.
Triage, investigate, and correlate security events to determine the severity and impact of potential threats.
Harness the power of Google Chronicle for threat intelligence and log analysis, gaining deeper visibility into potential security incidents.
Apply AI to identify patterns, anomalies, and behaviors indicative of potential security incidents, dramatically reducing false positives and improving detection accuracy.
Participate in on-call rotations for critical security incidents as needed.

Incident Response & Analysis:
Investigate and analyze security incidents and breaches, leveraging AI to automate initial analysis and supercharge threat hunting efforts.
Respond to security incidents following established procedures, including containment, eradication, and recovery actions.
Conduct root cause analysis and forensic investigations to understand attack vectors and recommend effective mitigation strategies.
Utilize Google SecOps and Chronicle's advanced tools to centralize security data, correlate events, and accelerate incident response workflows.
Apply machine learning algorithms to identify emerging threats and trends, providing actionable insights for incident response.

Google SecOps & Chronicle Integration:
Work with Google SecOps platform tools to streamline security operations, improve threat visibility, and automate workflows.
Collaborate with IT, Security, and Data Science teams to seamlessly integrate Google Chronicle's capabilities into the SOC, enhancing threat detection and incident resolution.
Optimize Google Chronicle for log management, threat hunting, and advanced analytics.

Security Automation:
Develop and maintain automated workflows for common security incidents, leveraging AI for intelligent decision-making and faster response times.
Automate routine SOC tasks such as log analysis, incident classification, and threat intelligence enrichment using Google SecOps and Chronicle integrations.

Reporting & Documentation:
Create detailed reports on incidents and threat intelligence summaries, integrating AI-driven findings and insights.
Prepare regular performance and security posture reports for internal stakeholders, highlighting key AI-driven improvements and threat mitigation outcomes.
Generate and present reports on threat trends, and SOC operations for internal stakeholders and customers.
Provide recommendations for security improvements and contribute to SOC playbook development.

Collaboration & Knowledge Sharing:
Work closely with cross-functional teams (e.g., IT, Customer Success, Engineering) to promote and improve AI-driven security initiatives and improve the customers' overall security posture.

What You'll Bring:
Education: Bachelor’s degree in Computer Science, Information Security, or a related field, or equivalent work experience. Relevant certifications (e.g., CISSP, CISM, CEH) are a definite plus.
Experience:
1+ years of experience in a Security Operations Center (SOC) or a similar security-focused role.
Hands-on experience with security analytics, log management, threat hunting, and incident response.
A genuine passion for applying automation and/or artificial intelligence and machine learning techniques to cybersecurity tasks, such as threat detection, anomaly detection, and security automation.

Technical Skills:
Strong understanding of cybersecurity concepts and frameworks (e.g., NIST, Mitre, ISO, Kill Chain).
Experience with core cybersecurity tools, such as intrusion detection systems (IDS), SIEM tools, and security automation platforms.
Knowledge of security technologies such as firewalls, endpoint protection, IDS/IPS, and threat intelligence platforms.

Soft Skills:
Exceptional analytical and problem-solving skills – you love digging into the details.
Excellent communication skills – you can explain complex security concepts to both technical and non-technical audiences.
Ability to thrive under pressure in a fast-paced, dynamic environment – you're calm, collected, and ready to tackle any challenge.

Bonus Points:
Experience with security orchestration, automation, and response (SOAR) platforms.
Exposure to cloud security platforms (e.g., AWS, Azure, Google Cloud) and the associated risks.
Practical experience working with Google SecOps tools and Chronicle for centralized threat intelligence and event correlation.
Hands-on experience with the Microsoft security platform (Sentinel, Defender).

Why Join TENEX.AI?

Be a Pioneer: Work with cutting-edge AI-driven cybersecurity technologies and Google SecOps solutions.
Collaborate with the Best: Join a talented and innovative team focused on continuously improving security operations.
Competitive Rewards: Receive a competitive salary and benefits package.
Growth & Development: Expand your knowledge in AI, cybersecurity, and emerging technologies – we invest in your future.

If you're a cybersecurity enthusiast with a passion for AI and experience with Google SecOps and Chronicle, we want to hear from you! Apply now and help us build the future of cybersecurity.