Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
Why Consider This Job Opportunity
- Opportunity to work with cutting-edge AI-driven cybersecurity technologies and Google SecOps solutions
- Competitive salary and benefits package
- Flexibility of fully remote work with the option for relocation to vibrant hubs in Florida or Kansas City
- A culture of growth and development, with opportunities to expand your knowledge in AI, cybersecurity, and emerging technologies
- Collaborate with a talented and innovative team focused on continuously improving security operations
- Monitor security alerts and events across the enterprise network using traditional tools and AI/ML-powered systems
- Investigate and analyze security incidents and breaches, leveraging AI to automate analysis and enhance threat hunting
- Respond to security incidents following established procedures, including containment, eradication, and recovery actions
- Collaborate with IT, Security, and Data Science teams to integrate Google Chronicle’s capabilities into the SOC
- Develop and maintain automated workflows for common security incidents, leveraging AI for intelligent decision-making
- Bachelor’s degree in Computer Science, Information Security, or a related field, or equivalent work experience
- 1+ years of experience in a Security Operations Center (SOC) or similar security-focused role
- Strong understanding of cybersecurity concepts and frameworks (e.g., NIST, Mitre, ISO)
- Hands-on experience with security analytics, log management, threat hunting, and incident response
- Excellent communication skills for interacting with internal teams and external customers
- Experience with security orchestration, automation, and response (SOAR) platforms
- Exposure to cloud security platforms (e.g., AWS, Azure, Google Cloud) and the associated risks
- Practical experience working with Google SecOps tools and Chronicle for centralized threat intelligence and event correlation
- Hands-on experience with the Microsoft security platform (Sentinel, Defender)
"We prioritize candidate privacy and champion equal-opportunity employment. Central to our mission is our partnership with companies that share this commitment. We aim to foster a fair, transparent, and secure hiring environment for all. If you encounter any employer not adhering to these principles, please bring it to our attention immediately. We are not the EOR (Employer of Record) for this position. Our role in this specific opportunity is to connect outstanding candidates with a top-tier employer."
Talentify helps candidates around the world to discover and stay focused on the jobs they want until they can complete a full application in the hiring company career page/ATS. #CyberFocusAI
Key Skills
Ranked by relevanceReady to apply?
Join Cyber Focus AI and take your career to the next level!
Application takes less than 5 minutes

