Online Information Security Operations Analyst
Description
🛡️ Online Information Security Operations Analyst (Remote)
🌟 Introduction to Our Digital Fortress
Ever wondered what happens when cybersecurity meets creativity? Welcome to our world, where data is guarded not just with firewalls, but with flair. Born from an idea to combine analytical precision with imaginative innovation, we've cultivated a space where security professionals thrive on passion, not just protocols. Our digital HQ is less cubicle, more creative lab—where automation meets artistry, and defending digital assets becomes a collaborative, high-stakes strategy game. We’ve carved out a culture that values expression, ingenuity, and results. This is your playground if you see patterns in digital noise, translate threats into solutions, and get excited about cybersecurity beyond buzzwords. Our analysts wear many hats: detectives, engineers, architects, and sometimes fortune tellers. It’s about having the foresight to anticipate, the curiosity to investigate, and the creativity to innovate.
We’re on a mission to rewrite the cybersecurity playbook—and it starts with people like you. If solving complex problems while sipping coffee in comfy slippers excites you, we speak your language. This is a chance to shape not just code but culture. With an annual salary of $122,000, this remote role invites you to make a difference—wherever you are. The world needs more than security analysts—it needs strategists with a soul.
🎯 Role Overview
🔍 Key Responsibilities
- ✨ Continuously monitor security events and logs to identify threats, anomalies, and potential vulnerabilities before they escalate
- 🧠 Respond to incidents with clarity and control—leading the charge on mitigation and future-proofing solutions
- 🌎 Work cross-functionally with software, infrastructure, and DevOps teams to implement security best practices and guardrails
- 🚀 Automate and innovate daily workflows, integrating scripts and tools to boost incident response time and efficiency
- 🔒 Lead threat intelligence analysis, contributing real-time insights that inform strategic security planning
- ⚖️ Ensure compliance with global data regulations, including GDPR, HIPAA, and ISO standards
- 🧩 Design dashboards that make real-time metrics accessible, digestible, and actionable
- 🛠️ Tune detection tools to reduce false positives and increase signal-to-noise ratio
- 🔁 Continuously improve incident response playbooks based on post-incident reviews
👤 Candidate Profile
🧠 Required Skills & Experience
- ✅ ✔️ At least three years of direct involvement in security operations, including threat detection and mitigation strategies, threat detection, and vulnerability remediation
- ✅ Experience managing and tuning SIEM platforms (e.g., Splunk, ELK)
- ✅ Familiarity with IDS/IPS systems, endpoint detection tools, and cloud-native security controls
- ✅ Expertise in AWS, Azure, or GCP security components and architectures
- ✅ Strong scripting and automation skills using Python, Bash, or PowerShell
- ✅ Proven ability to write detailed incident response reports and playbooks
- ✅ Strong understanding of the MITRE ATT&CK framework and related threat models
🏅 Preferred Qualifications
- ⭐ Professional certifications like CISSP, CEH, Security+, GSEC
- ⭐ Prior work with SOAR platforms for orchestrated response workflows
- ⭐ Experience performing forensic analysis, penetration testing, or red/blue teaming
- ⭐ Ability to document incidents in engaging, understandable formats for non-tech stakeholders
- ⭐ Familiarity with compliance frameworks such as NIST, ISO 27001, or PCI DSS
🧬 Company Culture & Values
🎨 Creative and Collaborative Environment
We don’t believe in one-size-fits-all talent. We believe in:
- 🤩 Creative autonomy—bring your boldest ideas, we’ll listen
- 🌟 Flat hierarchy—where your voice matters more than your job title
- 🧙 Curiosity and experimentation—our favorite way to learn
- 🚀 Fail-fast innovation—we iterate quickly, learn constantly, and celebrate progress
- ✨ Global collaboration—our team spans time zones, but works like one
- 🔍 Transparency—we communicate openly and solve problems together
- 🧑🎓 Continuous learning—we encourage team members to grow in every direction
💡 Our Unique Touch
- Weekly Cyber Jam Sessions to exchange ideas and crack quirky use cases
- Annual Virtual Hackathons to flex creative muscles and test wild theories
- A digital kudos wall—because recognition fuels innovation
- Optional role-play simulations where you take the lead as Chief Incident Commander
- Access to masterclasses and guest sessions from top minds in infosec
🧭 Learning & Growth Opportunities
📚 Skill Enhancement
- 🔎 Translate real-world challenges into secure, scalable digital solutions
- 🚪 Deepen expertise in security frameworks, automation, and compliance
- 🌍 Partner with a global, diverse team that shares and grows knowledge freely
- 🧬 Lead mission-critical projects that shape the company’s broader security philosophy
- 💬 Access a dedicated mentor to accelerate personal and professional growth
- 🎓 Use your annual budget for certifications, custom courses, and research initiatives
- 🎯 Contribute to open-source security initiatives and thought leadership
🎁 Compensation & Perks
💼 Benefits Package
- 📈 $122,000 base annual salary, with performance incentives
- 🤵 Fully flexible hours—design your workweek around when you thrive
- 🌎 100% remote—whether you’re by the beach, in the hills, or at your kitchen table
- 👥 Comprehensive mental health and well-being initiatives
- ✨ Annual professional development budget for certifications, conferences, or courses
- 🌟 Team celebrations, digital retreats, and surprise creativity challenges
- 🧩 Choose-your-own-equipment setup allowance
- 🍃 Paid recharge weeks and quarterly “No Meeting” days
- 🛫 Travel stipends for annual team gatherings and summits
🛠️ Tech Stack You'll Use
🖥️ Platforms & Tools
- 🧰 SIEM: Splunk, Elastic Stack
- ⚖️ Cloud Security: AWS GuardDuty, Azure Sentinel, GCP Chronicle
- 🚀 Firewalls & Network: Palo Alto, Fortinet, Cisco Umbrella
- ⛏️ DevOps Integration: Git, Jenkins, Terraform, Docker
- 📑 Endpoint & Threat Defense: SentinelOne, Carbon Black, CrowdStrike
- 🧠 Intelligence & Analytics: MITRE ATT&CK, ThreatConnect, VirusTotal
- 🔄 Automation Tools: Ansible, Puppet, Rundeck
- 📡 Vulnerability Management: Tenable, Qualys
🚀 Ready to Join the Adventure?
We’re not hunting for the usual. We’re looking for someone who laughs in the face of brute-force attempts and sees a misconfigured API as a creative puzzle, not a nuisance. If you get giddy about anomaly detection, you're our kind and believe firewalls can be fabulous. We value thinkers over titles and substance over jargon. This role isn’t about checking boxes. It’s about checking threats before they cause chaos. It’s about having the creative courage to ask, “What if?” and the technical chops to say, “Here’s how.”
So, ready to flex your skills in a space that respects your genius, supports your growth, and values your unique spark?