Senior Security Operations Analyst

Job Category: Technology and IT
Job Type: Full Time
Job Location: USA
Company Name: Clear Street

Company Overview

Clear Street is transforming the brokerage ecosystem with cutting-edge technology. Founded in 2018, Clear Street is a cloud-native financial technology firm that is modernizing the outdated infrastructure traditionally used across capital markets. By building a fully cloud-native clearing and custody system from the ground up, Clear Street is designed to meet the demands of today’s complex, global financial landscape.

Responsibilities:

  • Conduct proactive threat hunting across cloud environments (AWS/Azure) and on-premises infrastructure to identify potential risks before they escalate.
  • Design and execute strategic threat-hunting initiatives using advanced data analytics to detect anomalies and concealed threats.
  • Continuously monitor, analyze, and respond to security alerts and incidents within a 24/7 SOC (Security Operations Center) environment.
  • Work flexibly in staggered shifts, including weekends, to support the round-the-clock operations of the SOC.
  • Perform in-depth forensic analysis on cloud workloads, endpoints, network traffic, and logs to support incident investigations and root cause analysis.
  • Enhance SOC maturity by recommending and implementing improvements to detection workflows, playbooks, and operational procedures.
  • Stay informed about the evolving threat landscape, proactively identifying opportunities to strengthen detection mechanisms.
  • Optimize the utilization of SIEM (Security Information and Event Management), EDR (Endpoint Detection and Response), and other security tools to enhance visibility and detection capabilities.
  • Maintain comprehensive documentation of incidents, investigations, and threat-hunting activities to promote knowledge sharing and team development.
  • Collaborate effectively with team members to foster growth, innovation, and continuous learning.
  • Demonstrate advanced data analytics skills, leveraging sophisticated tools and methodologies to correlate data and uncover patterns within large datasets.

Requirements:

  • Minimum of 3 years of hands-on experience in SOC operations, threat hunting, and incident response.
  • In-depth knowledge of AWS and Azure security architectures, services, and associated threat landscapes.
  • Expertise in security frameworks such as MITRE ATT&CK, as well as proficiency with commonly used SIEM, SOAR (Security Orchestration, Automation, and Response), and EDR platforms.
  • Advanced data analytics capabilities, with a proven ability to analyze logs and telemetry data from diverse sources.
  • Familiarity with forensic tools and methodologies for conducting thorough incident investigations.
  • Excellent documentation and communication skills to effectively convey complex technical information.
APPLY

Apply for this position

Allowed Type(s): .pdf, .doc, .docx