Threat and Vulnerability Analyst | Security Monitoring| Experienced Hire

Overview

On Site
Full Time

Skills

Real-time
Security Operations
Forensics
Information Security
Collaboration
Conflict Resolution
Problem Solving
React.js
Oracle Linux
Cyber Security
Incident Management
Security Engineering
Scripting
Windows PowerShell
Python
Workflow
SIEM
Log Management
Threat Analysis
Vulnerability Management
Computer Science
Information Technology

Job Details

Overview

Overview

At Susquehanna, our Security Monitoring team sits on the front lines - engineering the systems, detections, and workflows that protect our environment, while also responding to threats in real time. We're a flat, cross-functional group of security engineers who design and build monitoring capabilities, integrate data sources, write and tune detection rules, investigate alerts, and lead incident response. If you want to apply your engineering skills to high-impact security challenges, this is the place to do it.

In this role, you will:
  • Engineer, tune, and maintain the detection and monitoring systems that power our security operations.
  • Develop and deploy detection rules and automation to identify threats across our environment.
  • Investigate and respond to alerts and incidents, performing both rapid triage and deep forensic analysis.
  • Integrate new log sources and security tools into our detection pipeline.
  • Collaborate with other security teams to operationalize threat intelligence and improve our security posture.


Five Reasons to Join SIG's Information Security Team:
  1. Variety without silos - work across engineering, operations, and intelligence without being boxed into a narrow role.
  2. End-to-end ownership - take ideas from concept through implementation, deployment, and ongoing improvement.
  3. Collaborative expertise - join a team that values curiosity, constant learning, and sharing knowledge freely.
  4. Proactive problem-solving - build solutions to prevent incidents, not just react to them.
  5. Unlimited growth potential - take on new responsibilities based on skill and initiative, not tenure.

What we're looking for

What we're looking for:
  • 1+ years of experience in cybersecurity, ideally in threat detection, incident response, or security engineering.
  • Strong scripting or programming skills (e.g., PowerShell, Python, or similar) to automate workflows.
  • Experience working with security data pipelines, SIEM platforms, or log management systems.
  • Familiarity with threat intelligence, detection rule creation, or vulnerability management.
  • Bachelor's degree in Computer Science, Information Technology, or related technical discipline.


SIG does not accept unsolicited resumes from recruiters or search firms. Any resume or referral submitted in the absence of a signed agreement will become the property of SIG and no fee will be paid.

#LI-RH1
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.