Senior Cybersecurity Analyst - Revolutionize Security with AI at TENEX.AI
TENEX.AI is not your average Managed Detection and Response (MDR) provider. We're an AI-native, automation-first powerhouse, built for scale and backed by Andreessen Horowitz. We're a force multiplier for defenders, empowering organizations with advanced threat detection, rapid response, and continuous protection. Join our team of industry experts and be part of a fast-growing startup revolutionizing the cybersecurity landscape.
Ready to level up your career? We're seeking a highly skilled and proactive Senior Cybersecurity Analyst to join our Security Operations Center (SOC) team. If you're passionate about leveraging AI and machine learning (ML) to outsmart cyber threats, and you're comfortable leading and mentoring others, this is your chance to make a real impact. You'll be instrumental in safeguarding digital infrastructure, ensuring rapid threat detection, and continuously improving our security processes – all while working with cutting-edge technology like Google SecOps (including Google Chronicle).
Culture is Key: At TENEX.AI, we value collaboration and community. While we champion in-person work, we also offer flexibility for exceptional talent. Check out our culture deck at culture.tenex.ai to learn more.
Location, Location, Location (or Not!):
Epic Hubs: We offer lucrative relocation packages to our hubs in Sarasota, Florida (near Tampa) and Overland Park, Kansas (Kansas City metro). Enjoy a lower cost of living, zero state income tax (Florida), and a thriving pro-business environment.
Remote Freedom (For the Exceptional): For the rare "10x of 10x" talent, we offer fully remote options. Competition is fierce, and standards are high, but if you're an unrivaled force, we encourage you to apply.
Key Responsibilities:
Threat Monitoring & Detection:
Monitor security alerts and events using traditional tools and AI/ML-powered systems.
Triage, investigate, and correlate security events to determine severity and impact.
Leverage Google Chronicle for threat intelligence and log analysis.
Apply AI to identify patterns and anomalies indicative of potential incidents.
Participate in on-call rotations for critical security incidents.
Incident Response & Analysis:
Investigate and analyze security incidents and breaches, leveraging AI to automate initial analysis and enhance threat hunting.
Respond to incidents following established procedures (containment, eradication, recovery).
Conduct root cause analysis and forensic investigations.
Utilize Google SecOps and Chronicle to centralize data, correlate events, and accelerate response.
Apply machine learning algorithms to identify emerging threats.
Google SecOps & Chronicle Integration:
Work with Google SecOps tools to streamline security operations and improve threat visibility.
Collaborate with IT, Security, and Data Science teams to integrate Google Chronicle into the SOC.
Optimize Google Chronicle for log management, threat hunting, and advanced analytics.
Security Automation:
Develop and maintain automated workflows for common incidents, leveraging AI for intelligent decision-making.
Automate routine SOC tasks using Google SecOps and Chronicle integrations.
Reporting & Documentation:
Create detailed incident reports and threat intelligence summaries, integrating AI-driven findings.
Prepare performance and security posture reports for internal stakeholders, highlighting AI-driven improvements.
Generate and present reports on threat trends and SOC operations.
Provide recommendations for security improvements and contribute to SOC playbook development.
Collaboration & Knowledge Sharing:
Work with cross-functional teams to promote AI-driven security initiatives.
Share knowledge of AI-powered security techniques and Google SecOps tools with the SOC team.
Qualifications:
Education: Bachelor’s degree in Computer Science, Information Security, or related field (or equivalent experience). Relevant certifications (CISSP, CISM, CEH) are a plus.
Experience:
4+ years of experience in a Security Operations Center (SOC) or similar security role.
Hands-on experience with security analytics, log management, threat hunting, and incident response.
Strong interest in applying automation, AI, and machine learning to cybersecurity tasks.
Technical Skills:
Strong understanding of cybersecurity concepts and frameworks (NIST, MITRE ATT&CK, ISO, Kill Chain).
Experience with cybersecurity tools such as IDS, SIEM, and security automation platforms.
Proficiency in scripting languages (Python, PowerShell) for automation and integration.
Knowledge of security technologies such as firewalls, endpoint protection, IDS/IPS, and threat intelligence platforms.
Soft Skills:
Strong analytical and problem-solving skills.
Excellent communication skills.
Ability to work under pressure in a fast-paced environment.
Preferred Skills:
Experience with security orchestration, automation, and response (SOAR) platforms.
Exposure to cloud security platforms (AWS, Azure, Google Cloud) and associated risks.
Practical experience working with Google SecOps tools and Chronicle for threat intelligence and event correlation.
Hands-on experience with the Microsoft security platform (Sentinel, Defender).
Why Join Us?
Opportunity to work with cutting-edge AI-driven cybersecurity technologies and Google SecOps solutions.
Collaborate with a talented and innovative team focused on continuously improving security operations.
Competitive salary and benefits package.
A culture of growth and development, with opportunities to expand your knowledge in AI, cybersecurity, and emerging technologies.
If you're passionate about combining cybersecurity expertise with artificial intelligence and have experience with Google SecOps and Chronicle, we encourage you to apply! Come build the future of cybersecurity with us.