Security Operations Engineer II optimizing security operations at Credit Acceptance. Collaborating on threat response and managing security tool configurations with a focus on automation.
Manage proxy filtering policies, exceptions, SSL inspection, and performance troubleshooting.
Build automation and playbooks (Python/PowerShell, SOAR, APIs) to streamline SecOps tasks.
Implement CI/CD pipelines and Infrastructure-as-Code workflows for consistent, auditable security configuration changes.
Author and tune detection rules; improve signal quality and reduce false positives.
Maintain and author health dashboards, uptime/coverage metrics, and change governance documentation.
Conduct knowledge transfers through runbooks, how-to guides, tabletop exercises, and lunch & learn training sessions.
Maintain upgrade schedules, license compliance, configuration baselines, and key/secret rotations.
Analyze block events for false positives; measure impact; retire exceptions on schedule and report residual risk.
Build and maintain an automation backlog in partnership with SecOps, prioritizing high-frequency, high-toil tasks.
Provide on-call support for tooling availability and ingestion/normalization issues.
Report on metrics (uptime, coverage, MTTR, lead time, change success rate, exception aging).
Requirements
Bachelor’s degree in computer science, Information Systems, Data Science or closely related field of study or equivalent experience
Minimum 2 years of experience in cyber security, anomaly detection, Security Operations Center (SOC) detection, threat analytics, security incident and event management (SIEM), information technology (IT), operations incident response, network security or security engineering
Basic experience administering, deploying and managing security tools.
Basic experience operating WAF/proxy and SIEM/SOAR.
Scripting in Python and/or PowerShell and building API integrations; JSON/YAML proficiency.
CI/CD and Git workflows; Infrastructure-as-Code for security configurations.
Basic understanding of TLS/SSL, HTTP, identity-aware policies, and egress/ingress routing.
Documentation discipline and change management (ITIL basics).
Ability to produce formal and informal reports, briefings, and analysis of security controls.
Experience with Endpoint Detection and Response (EDR) or Intrusion Detection System or Intrusion Prevention System (IDS/IPS) monitoring tools.
Understanding of MITRE ATT&CK Framework and Cyber Kill Chain flow
Understanding of incident response processes and risk management.
Benefits
Excellent benefits package that includes 401(K) match
Adoption assistance
Parental leave
Tuition reimbursement
Comprehensive medical/dental/vision
Many nonstandard benefits that make us a Great Place to Work
SecOps Engineer responsible for maintaining and improving application security in cloud infrastructure at Shopmonkey. Collaborating on security tools and processes with a focus on compliance and incident management.
Senior SOC Analyst at Telstra helping protect employees and customers from cyber threats. Leading incident response and threat analysis in Security Operations Centre.
Physical Security Operations Manager leading physical security initiatives and managing guard operations for data center construction. Focused on protecting assets and mitigating risks in critical environments.
Cybersecurity Analyst focusing on threat detection and incident response. Collaborating on vulnerabilities and ensuring a secure client environment at PwC.
Associate Director leading Game Security Operations for Activision across enforcement and threat intelligence disciplines. Ensuring daily effectiveness and strategic development of security across Activision titles.
Senior Incident Response Engineer leading advanced security responses focused on Microsoft E5 security at Acrisure. Collaborating across teams for robust incident management and security policy enforcement.
Senior Director of Product Marketing coordinating go - to - market strategy for endpoint security solutions at Tanium. Leading cross - functional teams to enhance product positioning and market impact.
SecOps Engineer implementing infrastructure security solutions in AWS and GCP at Tala. Focused on vulnerability management and protection in a global financial infrastructure company.
SOC Manager leading cybersecurity operations and strategies for federal clients in a 24/7 environment. Managing SOC activities and mentoring teams while maintaining security integrity.
SOC Analyst role focusing on IT security posture monitoring and threat detection use case development for MAHLE. Collaborate with global teams to enhance security processes and tools.