Company Overview
Clear Street is transforming the brokerage ecosystem with cutting-edge technology. Founded in 2018, Clear Street is a cloud-native financial technology firm that is modernizing the outdated infrastructure traditionally used across capital markets. By building a fully cloud-native clearing and custody system from the ground up, Clear Street is designed to meet the demands of today’s complex, global financial landscape.
Responsibilities:
- Conduct proactive threat hunting across cloud environments (AWS/Azure) and on-premises infrastructure to identify potential risks before they escalate.
- Design and execute strategic threat-hunting initiatives using advanced data analytics to detect anomalies and concealed threats.
- Continuously monitor, analyze, and respond to security alerts and incidents within a 24/7 SOC (Security Operations Center) environment.
- Work flexibly in staggered shifts, including weekends, to support the round-the-clock operations of the SOC.
- Perform in-depth forensic analysis on cloud workloads, endpoints, network traffic, and logs to support incident investigations and root cause analysis.
- Enhance SOC maturity by recommending and implementing improvements to detection workflows, playbooks, and operational procedures.
- Stay informed about the evolving threat landscape, proactively identifying opportunities to strengthen detection mechanisms.
- Optimize the utilization of SIEM (Security Information and Event Management), EDR (Endpoint Detection and Response), and other security tools to enhance visibility and detection capabilities.
- Maintain comprehensive documentation of incidents, investigations, and threat-hunting activities to promote knowledge sharing and team development.
- Collaborate effectively with team members to foster growth, innovation, and continuous learning.
- Demonstrate advanced data analytics skills, leveraging sophisticated tools and methodologies to correlate data and uncover patterns within large datasets.
Requirements:
- Minimum of 3 years of hands-on experience in SOC operations, threat hunting, and incident response.
- In-depth knowledge of AWS and Azure security architectures, services, and associated threat landscapes.
- Expertise in security frameworks such as MITRE ATT&CK, as well as proficiency with commonly used SIEM, SOAR (Security Orchestration, Automation, and Response), and EDR platforms.
- Advanced data analytics capabilities, with a proven ability to analyze logs and telemetry data from diverse sources.
- Familiarity with forensic tools and methodologies for conducting thorough incident investigations.
- Excellent documentation and communication skills to effectively convey complex technical information.