Security Analyst - Tier 2 (West Coast, 2nd shift)
7AI is on a mission to put swarming AI agents in the hands of defenders to offload non-human work, shift people up, and finally focus on achieving the security outcomes that teams have been searching for. We are seeking curious, detail-oriented, technically adept Security Analysts who thrive on solving complex, high-stakes puzzles and are deeply customer-obsessed to continue our mission of building the world’s first Agentic Security Platform.What You’ll Do:Analyze and validate investigations completed by the AI Agents for accuracy, completeness, and riskCorrelate data from various data sources including cloud, endpoint, identity, network, etc. to understand the full picture of a malicious activityInvestigate malicious activity that the 7AI Agents responded to and understand the complexity of the attack that was stopped including the risk that was prevented for customersUse our advanced AI Agents to hunt in customer environments to detect and remediate emerging threats, ultimately contributing to detections that will be folded back into the productAssist customers with ongoing threat monitoring, triage, and prioritization of security alerts as needed but especially during incidents to resolve threats and secure the environmentProactively identify potential threats and anomalies in customer environments by reviewing logs and malicious findingsUtilize your supreme communication skills to engage with customers who vary in their level of technical depth and focus (from SOC analysts to CISOs)Architect processes while we build out this elite organization to scale the operation sustainably while maintaining consistent qualityCollaborate with the Engineering and Product teams, providing feedback on the customer experience and assist in optimizing and tuning the AI platformStay current with emerging cybersecurity trends, vulnerabilities, and new attack techniques, especially the field of AI-driven attacksRequired Qualifications:2+ years of experience in cyber security operationsComfortable with on call weekend shifts as needed and working on a 4PM-Midnight PST shiftHands-on experience with investigating alerts and across multiple sources (endpoint, network, identity, email, cloud, etc.)Strong understanding of security monitoring tools (XDR, SIEM, IDS/IPS, IDP, etc.)Familiarity with log telemetry conceptsExperience analyzing and investigating security alerts from multiple sources, including intrusion detection systems, network monitoring tools, and endpoint protection platformsWorking knowledge of common attack techniques and frameworks (MITRE ATT&CK) and incident triage methodologiesStrong analytical and problem-solving skills, with the ability to verify AI-driven analysis and make independent security decisionsData querying experience with SIEM querying technologies (SPL, KQL, FQL, SQL, etc) and familiarity with log / telemetry conceptsFamiliarity with Malware Analysis methodsGreat interpersonal skills with a service oriented mindsetProven track record of successfully collaborating in a teamPreferred qualifications:Prior experience in a Managed Services environmentIncident Handling experienceRelevant certifications: Security+, GSEC, GCIH
Apply Now
Apply Now