Cybersecurity Incident Response Analyst detecting and responding to cyber threats at NOV. Collaborating using AI tools to enhance cybersecurity operations across IT, cloud, and OT environments.
Responsibilities
Monitor, triage, and investigate alerts from SIEM, EDR, identity platforms, and cloud environments
Use AI/LLM-powered tools to enrich alerts, summarize logs, and support root cause analysis
Correlate telemetry across identity, endpoint, cloud, and network systems to build clear incident timelines
Support containment and remediation efforts in collaboration with SOC, engineering, and IT teams
Analyze AI-generated threat scores, behavioral anomalies, and recommendations to detect stealthy or emerging threats
Assist in evidence collection for forensics, insider threat, or audit-related investigations
Document incidents thoroughly and contribute to response playbooks and process improvements
Participate in tabletop exercises and threat simulation activities to improve detection and response maturity
Recommend enhancements to detection rules and automation workflows based on incident learnings
Other duties as assigned by organization leadership
Requirements
Possess strong communications and interpersonal skills in English
Self-directed, organized, and able to manage multiple priorities
Strong ability to work collaboratively with others, to influence based on knowledge and experience
Experience in a SOC, cybersecurity operations, or incident response role
Hands-on experience with tools like SentinelOne, Defender for Endpoint, Microsoft Sentinel, Zscaler, or Splunk
Familiarity with MITRE ATT&CK and common attacker tactics, techniques, and procedures
Working knowledge of endpoint behavior, log analysis, DNS/HTTP/SOC telemetry, and identity-related indicators
Basic scripting or automation (PowerShell, Python, Bash) to assist in triage or data parsing
Experience using or interpreting AI/ML-driven detection tools, or LLM-based security assistants (e.g., for alert summaries or ticket generation)
Strong communication and documentation skills for technical and non-technical audiences
Calm under pressure and effective in active response situations
SOC Analyst monitoring security events and responding to incidents at Junglee Games. Collaborating on security protocols to ensure protection of digital assets.
Senior Director of Global Security Operations at CyrusOne strategizing and managing security across global data centers. Driving execution, governance, and operational excellence in a high - availability environment.
Cybersecurity generalist at PwC providing security solutions and maintaining the protection of client systems. Involves monitoring security alerts, incident response, and collaboration with stakeholders.
Security Operations Manager overseeing safety measures for corporate office locations and events at Whatnot. Responsible for developing security frameworks and managing vendor relationships across global operations.
Manager overseeing technical security operations for the Protection Services department. Responsible for managing security systems, staff training, and interdepartmental collaboration.
Principal in Security Monitoring Response at Mastercard managing global crises and resilience operations. Leading incident response efforts and ensuring the safety of people and assets.
SOC Analyst II providing real time security monitoring and threat hunting services for clients in various industries. Assisting in identifying security incidents and managing vulnerabilities.
Security Incident Response Orchestration Lead at Bank of America defining automation for security incident workflows with a focus on Splunk SOAR and Tines. Collaborating with security operations and engineering teams to implement scalable solutions.
SOC Analyst II providing tier II cybersecurity support in a Security Operations Center environment. Conducting vulnerability assessments and analyzing cyber threats while training junior staff members.