Job Description:
Latest job information from Foresite for the position of Security Analyst II. If the Security Analyst II vacancy in United States matches your qualifications, please submit your latest application or CV directly through the updated Jobkos job portal.
Please note that applying for a job may not always be easy, as new candidates must meet certain qualifications and requirements set by the company. We hope the career opportunity at Foresite for the position of Security Analyst II below matches your qualifications.
Foresite is seeking a Security Analyst II who has a passion for security, a keen eye for detail, and a drive to protect organizations from cyberattacks. It's more than just a job; it's a launching pad for your cybersecurity career and a first step towards an exciting future at Foresite.
What You'll Do:
The Security Analyst II is a critical mid-level role within Foresite’s Security Operations Center. You will work inside our 24/7 Cyber Fusion Center, handling escalated security alerts, leading complex investigations for our managed customers across Google Security Operations (Chronicle) and our SOAR platform, and serving as a subject matter expert for the broader team. You will leverage your advanced knowledge of our detection stack and customer environments to resolve intricate threats and will act as a mentor and escalation point for our Analyst I team.
Act as an escalation point: Serve as the primary point of escalation for our Tier 1 Analysts. You will handle complex event triage escalations, guide junior analysts through difficult dispositions, and provide decisive action on high-severity alerts.
Be a point of information and mentorship: Act as a knowledge resource for the Analyst 1 team. Answer questions regarding investigations, customer environments, and tool navigation to help upskill the shift.
Investigate incidents end-to-end: Review complex alert context, gather evidence from Chronicle UDM and supporting tools, reach a final disposition, and either close the ticket with a documented rationale or escalate to Tier 3/Incident Response with a clear handoff.
Optimize investigation playbooks: Follow established playbooks for the detection stack, but actively identify gaps, propose workflow improvements, and help draft new guidance alongside your Team Lead to improve overall SOC efficiency.
Communicate clearly in tickets: Every ticket you touch should be understandable by the next analyst, the customer, or an auditor reading it six months from now. Your written analysis is the primary artifact of your work and should set the standard for Tier 1 analysts.
Partner with customers: Lead communications through the ticketing system on routine and complex investigations, requests for information, and exclusion/suppression requests.
Meet SLA and quality targets: Consistently meet performance scorecards for time-to-resolve, triage accuracy, and ticket closure quality, setting a benchmark for the shift.
Contribute to detection fidelity: Actively hunt for noisy rules, false-positive patterns, and alert clusters. Submit highly detailed tuning requests and recommendations to the detection engineering team.
Participate in shift handoff: Brief the incoming shift on open investigations, anomalies observed, and escalated items waiting on customer response.
Who you are:
Experience: 2–4 years of prior experience in a SOC, incident response, or dedicated cybersecurity role.
Advanced knowledge of core security concepts: Deep understanding of the cyber kill chain and MITRE ATT&CK framework, common attack vectors (phishing, credential abuse, malware delivery, lateral movement), and hands-on experience with detection, prevention, and response tactics.
Proficiency with a SIEM: You have hands-on experience navigating SIEM platforms. You understand how alerts are generated, how to build advanced search queries, and how to pivot seamlessly from an alert to supporting log evidence to build a timeline of events.
Strong written communication: You will be writing in tickets that customers read. Clear, concise, accurate writing is non-negotiable.
Attention to detail: False positives and true positives often look nearly identical. You are the analyst who reads the full log line, not the summary, and you teach others to do the same.
Ability to work an assigned shift on-site in Overland Park: including weekend and holiday coverage as scheduled.
CompTIA Sec+, CompTIA CySA+, BTL1, or equivalent certification is required within 90 days of hire if not already held.
Nice to Have
Hands-on experience with Google Security Operations (Chronicle), Splunk, Elastic, or Microsoft Sentinel
BS of IT Security or Cyber Security
Familiarity with endpoint detection and response tools (CrowdStrike, SentinelOne, Defender for Endpoint, Carbon Black)
Intermediate scripting or query experience (Python, PowerShell, SQL, or YARA-L/SIEM query languages) to assist with automation or custom searches.
Prior MSSP or multi-tenant environment experience
Additional advanced certifications: GCIA, GCIH, Google Cloud Security Engineer, or similar.
Why Join Foresite?
We are a mission-driven partner helping organizations navigate an increasingly complex threat landscape. Founded by security practitioners, we’ve grown into a global leader in SecOps and MDR by staying true to our core value: radical transparency. When you join Foresite, you are part of a "humans-first" culture where your expertise is valued, and your well-being is a priority. We leverage our Google Cloud Premier SecOps Partnership to stay at the cutting edge, but we know that our greatest asset is our people.
What We Offer
Comprehensive Health & Wellness: Robust medical insurance options to keep you and your family healthy.
Employer-Covered Insurance: We fully provide employer-paid Dental coverage, as well as Short-Term (STD) and Long-Term Disability (LTD).
Recharge & Refuel: We believe in a true work-life balance. You’ll start with 3 weeks of paid vacation, plus additional sick leave and paid company holidays to ensure you have time to recharge.
Growth & Mentorship: Access to world-class training and mentorship. We support your career trajectory, whether you’re looking to deepen your technical skills or move into leadership.
Impactful Work: Help protect global clients using the latest AI-enhanced security tools and GCP native technologies.
Job Info:
- Company: Foresite
- Position: Security Analyst II
- Work Location: United States
- Country: US
How to Submit an Application:
After reading and understanding the criteria and minimum qualification requirements explained in the job information Security Analyst II at the office United States above, immediately complete the job application files such as a job application letter, CV, photocopy of diploma, transcript, and other supplements as explained above. Submit via the Next Page link below.
Next Page »