Security Operations Analyst
About the Role:
The Security Operations team at Gusto is on the front lines of protecting Gusto and our customers from a wide range of threats—phishing attacks, insider risks, data loss, and the latest sophisticated attack techniques. Every day, our distributed team across Eastern and Pacific time zones works in sync to strengthen our monitoring and response capabilities, ensuring swift and effective threat detection and mitigation.
We’re looking for an ambitious Security Analyst with 2+ years of experience to join us in advancing our security operations and vulnerability management initiatives. In this role, you’ll split your time between driving our Vulnerability Management Program and supporting essential security operations. If you have hands-on experience in cloud environments (AWS etc), a proactive approach to incident response, and familiarity with scripting languages (Python, Bash, Ruby), and collaborate with multiple areas of the company. This is an exceptional chance to grow your expertise in a dynamic setting.
Here’s what you’ll do day-to-day:
Security Monitoring & Incident Response: Perform real-time monitoring, respond to security incidents, and assist with post-incident analysis. This could include the following:
Administer, tune, and enhance security tools such as SIEM, endpoint detection & response, data loss prevention, etc.
Develop and maintain automation scripts and tools to enhance security operations efficiency and effectiveness.
Maintain documentation on security incidents, vulnerabilities, and procedures to support continuous improvement and compliance.
Support internal users with security concerns and questions, helping to strengthen and promote Gusto’s security culture.
Triage and analyze vulnerability results to identify and prioritize security weaknesses, escalating as necessary for immediate response.
Collaborate with cross-functional teams to drive the remediation of vulnerabilities.
Regularly audit and refine vulnerability management processes, tools, and reports to maintain accuracy, and ensure compliance with security policies.
Here’s what we're looking for:
Minimum Requirements:
2+ years of experience in security operations or a related field. Examples of required experience may include:
Monitoring security tools for alerts and investigating suspicious activity.
Conducting regular vulnerability assessments, triaging risks, and tracking remediation efforts.
Identifying, analyzing, and responding to security incidents, which includes root cause analysis and remediation.
Gathering and applying threat intelligence to proactively address potential security threats.
Documenting procedures and creating incident reports to improve response processes and compliance.
Basic understanding of networking, firewalls, and security protocols.
Operational familiarity with Linux and containers.
Understanding of K8s manifest files and package versioning.
A passion for continuous learning and a proactive approach to security challenges.
Exposure to cloud environments (AWS, Azure, or Google Cloud).
Knowledge of managing IAM permissions with Terraform.
Understanding of the principles of least privilege.
Scripting language proficiency.
Familiarity with security tools such as SIEM, endpoint protection, and vulnerability scanners.
Analyze and document findings effectively, providing clear insights into key issues.
Preferred Qualifications:
Experience with log analysis and digital forensics.
Experience leading an incident response investigation.
Understand vulnerabilities and how to patch them.
Experience with GitHub Dependabot.
Understanding of industry standard security frameworks and benchmarking.
Coding experience in one or more general purpose programming languages.
Security certifications (e.g., CISSP, CompTIA Security+, AWS Certified Cloud Practitioner) are a plus.
Interest in the landscape of security and its impact across multiple industries and tactics, techniques, procedures of threat actors.
Our cash compensation amount for this role is targeted at $112,000-125,000 in Denver & most remote locations, and $140,000-157,000 for San Francisco & New York. Final offer amounts are determined by multiple factors including candidate experience and expertise and may vary from the amounts listed above.
About the job
Apply for this position
Security Operations Analyst
About the Role:
The Security Operations team at Gusto is on the front lines of protecting Gusto and our customers from a wide range of threats—phishing attacks, insider risks, data loss, and the latest sophisticated attack techniques. Every day, our distributed team across Eastern and Pacific time zones works in sync to strengthen our monitoring and response capabilities, ensuring swift and effective threat detection and mitigation.
We’re looking for an ambitious Security Analyst with 2+ years of experience to join us in advancing our security operations and vulnerability management initiatives. In this role, you’ll split your time between driving our Vulnerability Management Program and supporting essential security operations. If you have hands-on experience in cloud environments (AWS etc), a proactive approach to incident response, and familiarity with scripting languages (Python, Bash, Ruby), and collaborate with multiple areas of the company. This is an exceptional chance to grow your expertise in a dynamic setting.
Here’s what you’ll do day-to-day:
Security Monitoring & Incident Response: Perform real-time monitoring, respond to security incidents, and assist with post-incident analysis. This could include the following:
Administer, tune, and enhance security tools such as SIEM, endpoint detection & response, data loss prevention, etc.
Develop and maintain automation scripts and tools to enhance security operations efficiency and effectiveness.
Maintain documentation on security incidents, vulnerabilities, and procedures to support continuous improvement and compliance.
Support internal users with security concerns and questions, helping to strengthen and promote Gusto’s security culture.
Triage and analyze vulnerability results to identify and prioritize security weaknesses, escalating as necessary for immediate response.
Collaborate with cross-functional teams to drive the remediation of vulnerabilities.
Regularly audit and refine vulnerability management processes, tools, and reports to maintain accuracy, and ensure compliance with security policies.
Here’s what we're looking for:
Minimum Requirements:
2+ years of experience in security operations or a related field. Examples of required experience may include:
Monitoring security tools for alerts and investigating suspicious activity.
Conducting regular vulnerability assessments, triaging risks, and tracking remediation efforts.
Identifying, analyzing, and responding to security incidents, which includes root cause analysis and remediation.
Gathering and applying threat intelligence to proactively address potential security threats.
Documenting procedures and creating incident reports to improve response processes and compliance.
Basic understanding of networking, firewalls, and security protocols.
Operational familiarity with Linux and containers.
Understanding of K8s manifest files and package versioning.
A passion for continuous learning and a proactive approach to security challenges.
Exposure to cloud environments (AWS, Azure, or Google Cloud).
Knowledge of managing IAM permissions with Terraform.
Understanding of the principles of least privilege.
Scripting language proficiency.
Familiarity with security tools such as SIEM, endpoint protection, and vulnerability scanners.
Analyze and document findings effectively, providing clear insights into key issues.
Preferred Qualifications:
Experience with log analysis and digital forensics.
Experience leading an incident response investigation.
Understand vulnerabilities and how to patch them.
Experience with GitHub Dependabot.
Understanding of industry standard security frameworks and benchmarking.
Coding experience in one or more general purpose programming languages.
Security certifications (e.g., CISSP, CompTIA Security+, AWS Certified Cloud Practitioner) are a plus.
Interest in the landscape of security and its impact across multiple industries and tactics, techniques, procedures of threat actors.
Our cash compensation amount for this role is targeted at $112,000-125,000 in Denver & most remote locations, and $140,000-157,000 for San Francisco & New York. Final offer amounts are determined by multiple factors including candidate experience and expertise and may vary from the amounts listed above.