Security Operations Analyst II
![CoreWeave Logo](https://cdn.jobscollider.com/logo/coreweave-8348.webp)
CoreWeave
Summary
Join CoreWeave's 24/7 security team as a Security Operations Analyst II in our Roseland, New Jersey Security Operations Center. Lead critical incident response efforts, perform forensics investigations, and enhance our detection and response capabilities. This role requires extensive experience in security operations, particularly with Linux, MacOS, and Kubernetes environments. You will manage security incidents, conduct forensics, utilize security tools, and mentor junior analysts. CoreWeave offers a competitive salary ($115,000-$135,000), comprehensive benefits, and a hybrid work environment with flexibility for remote work for those not within 30 miles of an office. We are committed to fostering a collaborative and supportive workplace.
Requirements
- 5+ years of experience in forensics, incident response, or security operations
- Extensive experience with Linux and MacOS systems, including deep knowledge of system internals, logging, and forensic artifacts
- Proven ability to perform digital forensics on compromised systems, including data recovery, analysis of malware, and network traffic analysis
- Experience with Kubernetes and familiarity with securing containerized environments
- Familiarity with modern security tools and platforms such as SIEM, EDR, IDS/IPS, and firewalls
- Strong understanding of network protocols, firewalls, VPNs, proxies, and other security technologies
- Strong analytical skills with the ability to handle and interpret large amounts of data, and the ability to translate these into actionable insights
- Excellent communication and collaboration skills, with the ability to work effectively in high-pressure situations
Responsibilities
- Be part of a 24/7/365 SOC, that includes a rotating on-call schedule for overnights/weekends
- Lead and manage security incidents, including detection, analysis, containment, and remediation, ensuring rapid response to potential threats across Linux, MacOS, and Kubernetes environments
- Perform forensics on compromised systems and root cause analysis, with a focus on Linux and MacOS
- Utilize SIEM, EDR, and other security tools to detect, investigate, and respond to suspicious activity in real-time
- Conduct post-incident reviews, providing insights and recommendations for improving security defenses
- Work closely with the threat intelligence team to identify emerging threats and ensure the incident response team is prepared to defend against them
- Mentor and guide junior security analysts, helping to foster a culture of continuous improvement and knowledge sharing
- Stay up-to-date with industry best practices, threat landscape trends, and relevant technologies to continually improve the organizationโs incident response capabilities
Benefits
- Medical, dental, and vision insurance - 100% paid for by CoreWeave
- Company-paid Life Insurance
- Voluntary supplemental life insurance
- Short and long-term disability insurance
- Flexible Spending Account
- Health Savings Account
- Tuition Reimbursement
- Mental Wellness Benefits through Spring Health
- Family-Forming support provided by Carrot
- Paid Parental Leave
- Flexible, full-service childcare support with Kinside
- 401(k) with a generous employer match
- Flexible PTO
- Catered lunch each day in our office and data center locations
- A casual work environment
- A work culture focused on innovative disruption