As a Senior Information Security Analyst, you'll conduct advanced threat detection and incident response that protects the foundation of Stuller's operations.
Working within our Security Operations Center, you'll investigate complex security events, proactively hunt threats across our infrastructure, and provide technical mentorship to analysts developing their skills.
This senior-level role requires deep SOC expertise and the ability to execute sophisticated investigations under pressure.
You'll make rapid decisions during incidents, contribute specialized knowledge to strengthen our defenses, and ensure our security tools align with NIST CSF and PCI-DSS requirements.
You'll influence security strategy and help develop the next generation of security professionals as you grow toward leadership opportunities within the team.
Your work enables Stuller's teams to serve customers with confidence, knowing security won't slow them down or let them down.
Key Responsibilities:
Security Monitoring, Detection & Incident Response: Serve as the technical authority validating recommendations from MDR and IR providers. Analyze security events across EDR/XDR platforms, network devices, and cloud services to distinguish true threats from false positives. Approve containment actions, make rapid decisions during incidents, and coordinate with stakeholders. Provide feedback to improve detection quality and document incident details for compliance.
Threat Hunting & Proactive Defense: Use threat intelligence, automation, and continuous monitoring to proactively hunt threats. Leverage security tools for detection and investigation, streamline response workflows, and analyze vulnerability scans. Support penetration testing, translate threat advisories into IT initiatives, and oversee implementation of security engineering changes such as rule updates, identity controls, network segmentation, and logging improvements.
Governance, Compliance & Continuous Improvement: Maintain and update incident response runbooks, security policies, and procedures to align with best practices and regulatory requirements (NIST CSF, PCI-DSS). Support audits by providing evidence of security controls and documentation. Monitor security tool health, escalate issues, and assist with configuration and integration.
Metrics, Reporting & Strategic Insight: Analyze incident data and trends to identify attack patterns and areas for improvement. Prepare technical reports and metrics for leadership, highlighting investigation findings and SOC performance. Use insights to recommend enhancements to detection and response capabilities and contribute to regular security posture reporting.
Collaboration, Mentorship & Knowledge Sharing: Guide junior analysts in complex investigations and analysis techniques. Share expertise on security tools and methodologies through mentorship and documentation. Help develop incident response playbooks and SOC best practices, and participate in tabletop exercises and incident response drills to maintain readiness.
Qualifications:
Basic Qualifications:
Education & Experience: Bachelor’s in Computer Science, Cybersecurity, Information Systems, or related field; or equivalent with 7+ years relevant experience. Minimum 5 years in information security, including 3-4 years in a SOC or security analyst role.
SOC Operations & Incident Response Expertise: Experience in SOC environments handling security monitoring, alert triage, and incident investigations. Skilled in the incident response lifecycle and using MITRE ATT&CK for threat classification.
Security Monitoring & SIEM Experience: Proficient with SIEM platforms (Splunk, Microsoft Sentinel, IBM QRadar, or similar), creating search queries, and analyzing alerts from EDR/XDR, network, and cloud security tools.
Threat Detection & Analysis: Ability to identify attack patterns (phishing, malware, unauthorized access, data exfiltration, insider threats) and correlate data from network logs, endpoints, and threat intelligence.
Technical Security Knowledge: Solid understanding of vulnerabilities and exploitation techniques. Experience analyzing logs from Windows, Linux, network devices, cloud platforms (AWS, Azure, GCP), and performing basic forensic analysis.
Frameworks, Standards & Compliance: Familiarity with NIST CSF, MITRE ATT&CK, and PCI-DSS compliance. Knowledge of audit processes and evidence collection.
Analytical & Communication Skills: Strong analytical thinking, attention to detail, and clear written/verbal communication for technical documentation and incident coordination.
Teamwork & Professional Standards: Collaborative in SOC environments, sharing knowledge, and maintaining confidentiality and ethical standards.
Cloud Security & Availability: Working knowledge of cloud security principles and major platforms (AWS, Azure, GCP). Willingness for after-hours or weekend coverage as needed.
Preferred Qualifications:
Advanced Education: Master’s in Cybersecurity, Information Assurance, Computer Science, Digital Forensics, or related discipline. Non-traditional backgrounds with strong experience also valued.
Professional Certifications: Certifications such as CISSP, GCIH, GCIA, OSCP, CEH, or equivalent.
Industry & Leadership Experience: Direct involvement in PCI-DSS, ISO 27001, HIPAA, SOC 2 compliance. Experience as a subject matter expert, contributing to playbook development, delivering technical training, and active participation in the security community (CTF, conferences, bug bounty, open-source).