Cybersecurity Analyst - Join the AI Revolution in Threat Detection!
TENEX.AI is not your typical MDR provider. We're an AI-native, automation-first powerhouse, built to scale and designed to be a force multiplier for defenders. Backed by Andreessen Horowitz and a team of industry veterans, we're revolutionizing cybersecurity with advanced threat detection, rapid response, and continuous protection. As an early employee, you’ll be instrumental in shaping our culture and the future of cybersecurity. Get in on the ground floor of a well-funded, rapidly growing startup with unlimited upside.
Are you a proactive and highly skilled Cybersecurity Analyst ready to leverage the power of AI and Google's SecOps platform (including Chronicle) to defend against tomorrow's threats? Join our Security Operations Center (SOC) team and play a vital role in safeguarding digital infrastructure, ensuring rapid threat detection, and continuously improving our security posture.
TENEX.AI Culture: We champion collaboration and community with in-person work while offering flexibility. Check out our culture deck: culture.tenex.ai
Relocation Packages Available: For top talent, we offer lucrative relocation packages to our epic hubs in Sarasota, Florida (outside Tampa), and Overland Park in the Kansas City metro. Break free from high taxes and cost of living in California or New York! Enjoy zero state income tax, personal freedom, endless sunshine in Florida, or authentic Midwest values in KC. See those listings on our careers page for details!
Remote Opportunity: For the rare "10x of 10x" talent, we offer fully remote opportunities. If you're an exceptional force in cybersecurity and prefer not to relocate, we encourage you to apply for this remote-first position. Be aware that competition is fierce, and standards are high!
Key Responsibilities:
Threat Monitoring & Detection:
Monitor security alerts and events across the enterprise network, utilizing both traditional tools and AI/ML-powered threat detection systems.
Triage, investigate, and correlate security events to determine the severity and impact of potential threats.
Leverage Google Chronicle's capabilities for threat intelligence and log analysis, enhancing visibility and providing insights into potential security incidents.
Apply AI to identify patterns, anomalies, and behaviors indicative of potential security incidents, reducing false positives and improving detection accuracy.
Participate in on-call rotations for critical security incidents as needed.
Incident Response & Analysis:
Investigate and analyze security incidents and breaches, leveraging AI to automate initial analysis and enhance threat hunting efforts.
Respond to security incidents following established procedures, including containment, eradication, and recovery actions.
Conduct root cause analysis and forensic investigations to understand attack vectors and recommend mitigation strategies.
Utilize Google SecOps and Chronicle’s advanced tools to centralize security data, correlate events, and accelerate incident response workflows.
Apply machine learning algorithms to identify emerging threats and trends, providing actionable insights for incident response.
Google SecOps & Chronicle Integration:
Work with Google SecOps platform tools to streamline security operations, improve threat visibility, and automate workflows.
Collaborate with IT, Security, and Data Science teams to integrate Google Chronicle’s capabilities into the SOC, enhancing threat detection and incident resolution.
Optimize Google Chronicle for log management, threat hunting, and advanced analytics.
Security Automation:
Develop and maintain automated workflows for common security incidents, leveraging AI for intelligent decision-making and faster response times.
Automate routine SOC tasks such as log analysis, incident classification, and threat intelligence enrichment using Google SecOps and Chronicle integrations.
Reporting & Documentation:
Create detailed reports on incidents and threat intelligence summaries integrating AI-driven findings and insights.
Prepare regular performance and security posture reports for internal stakeholders, highlighting key AI-driven improvements and threat mitigation outcomes.
Generate and present reports on threat trends, and SOC operations for internal stakeholders and customers.
Provide recommendations for security improvements and contribute to SOC playbook development.
Collaboration & Knowledge Sharing:
Work closely with cross-functional teams (e.g., IT, Customer Success, Engineering) to promote and improve AI-driven security initiatives and improve the customers' overall security posture.
Qualifications:
Education: Bachelor’s degree in Computer Science, Information Security, or a related field, or equivalent work experience. Relevant certifications (e.g., CISSP, CISM, CEH) are a plus.
Experience:
1+ years of experience in a Security Operations Center (SOC) or a similar security-focused role.
Hands-on experience with security analytics, log management, threat hunting, and incident response.
Interest in applying automation and/or artificial intelligence and machine learning techniques to cybersecurity tasks, such as threat detection, anomaly detection, and security automation.
Technical Skills:
Strong understanding of cybersecurity concepts and frameworks (e.g., NIST, Mitre, ISO, Kill Chain).
Experience with tools for cybersecurity, such as intrusion detection systems (IDS), SIEM tools, and security automation platforms.
Knowledge of security technologies such as firewalls, endpoint protection, IDS/IPS, and threat intelligence platforms.
Soft Skills:
Strong analytical and problem-solving skills.
Excellent communication skills for interacting with internal teams and external customers.
Ability to work under pressure in a fast-paced, dynamic environment.
Preferred Skills:
Experience with security orchestration, automation, and response (SOAR) platforms.
Exposure to cloud security platforms (e.g., AWS, Azure, Google Cloud) and the associated risks.
Practical experience working with Google SecOps tools and Chronicle for centralized threat intelligence and event correlation a plus.
Hands-on experience with the Microsoft security platform (Sentinel, Defender) is a plus.
Why Join Us?
Opportunity to work with cutting-edge AI-driven cybersecurity technologies and Google SecOps solutions.
Collaborate with a talented and innovative team focused on continuously improving security operations.
Competitive salary and benefits package.
A culture of growth and development, with opportunities to expand your knowledge in AI, cybersecurity, and emerging technologies.
If you're passionate about combining cybersecurity expertise with artificial intelligence and have experience with Google SecOps and Chronicle, we encourage you to apply and become a part of our mission to revolutionize the cybersecurity landscape!