Threat Detection & Response Analyst

San Jose, CA, US • Posted 8 days ago • Updated 6 days ago
Contract W2
Occasional Travel Required
On-site
Depends on Experience
Company Branding Image
Fitment

Dice Job Match Score™

🛠️ Calibrating flux capacitors...

Job Details

Skills

  • Netskope
  • Splunk
  • SIEM
  • SOC
  • NOC
  • Security

Summary

Job Title: "Threat Detection & Response Analyst"

Location: San Jose, CA (Onsite)

Duration: Long Term

Must Have's: 1) At least 1+ years hands-on experience with enterprise security tools such as Netskope and Splunk.

2) Overall 3 10 years of total experience.

Description:

  • Monitor, triage, and investigate security alerts and events across enterprise environments using Splunk SIEM, EDR, network, cloud, and endpoint telemetry.
  • Analyze security event logs from diverse sources including firewalls, IDS/IPS, endpoint protection platforms, operating systems, and cloud services to identify malicious activity.
  • Perform initial and advanced analysis of security incidents, determine scope and impact, identify root cause, and recommend containment and remediation actions.
  • Escalate confirmed incidents appropriately and support end-to-end incident response activities, including coordination with IT, cloud, and infrastructure teams.
  • Design, validate, tune, and optimize detection logic, correlation rules, dashboards, and alerting use cases to improve signal-to-noise ratio and operational efficiency.
  • Ensure log ingestion health, completeness, and fidelity across critical infrastructure and enterprise systems.
  • Support onboarding and integration of new log sources into the Splunk environment, including validation of parsing, normalization, and field extraction.
  • Conduct proactive threat hunting using SIEM, EDR, CASB, and cloud telemetry to identify advanced or evasive threats that bypass automated detections.
  • Monitor network traffic and behavioral indicators to detect anomalies, lateral movement, privilege abuse, and data exfiltration attempts.
  • Prioritize vulnerabilities and remediation efforts based on threat context, asset criticality, and business impact.
  • Partner with IT and infrastructure teams to track remediation, validate fixes, and reduce recurring risk.
  • Continuously improve detection coverage, response playbooks, and SOC workflows based on incident learnings and emerging threats.
  • Maintain accurate documentation for detection use cases, log flows, triage procedures, threat models, and operational standards.
  • Collaborate closely with cross-functional security and IT teams to ensure rapid, effective response to security incidents.

Requirements:

  • Bachelor s degree in Computer Science, Information Security, or a related field; Master s degree preferred.
  • 5+ years of experience in a SOC, threat detection, or incident response role with hands-on experience
  • Strong expertise in threat analysis, incident investigation, and response workflows.
  • Solid understanding of enterprise log sources including Windows/Linux servers, network devices, endpoints, and cloud platforms.
  • Experience triaging and investigating alerts in complex, multi-platform environments.
  • Familiarity with cloud environments such as AWS, Azure, or similar, including cloud-native logging and security services.
  • Knowledge of detection engineering, correlation logic, MITRE ATT&CK techniques, and SOC operational best practices.
  • Ability to communicate findings clearly and collaborate effectively across technical and non-technical teams.
  • Comfortable operating in diverse, global environments with strong adaptability and professionalism.
  • Curious, resilient, and data-driven mindset with a passion for continuous learning and threat research.
  • Relevant certifications such as CompTIA Security+, CISSP, Pentest+, or similar are a plus.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.
  • Dice Id: xorca001
  • Position Id: 8895125
  • Posted 8 days ago

Company Info

About Xoriant Corporation

Xoriant is a Sunnyvale, CA headquartered digital engineering firm with offices in the USA, Europe, and Asia. From Tech Startups to Fortune 100 Enterprises, we enable innovation, accelerate time to market, and ensure client competitiveness across industries. Across all our focus areas – platform engineering, cloud, data & and AI, and Security – every solution we develop benefits from our product engineering DNA and culture of innovation. It also includes successful methodologies, framework components, and accelerators for rapidly solving critical client challenges. For 30 years and counting, we have taken great pride in the longlasting, deep relationships we have with our clients.

For further information about Xoriant, please visit our website

About_Company_One
Create job alert
Set job alertNever miss an opportunity! Create an alert based on the job you applied for.

Similar Jobs

San Jose, California

6d ago

Easy Apply

Contract

$60 - $80

San Jose, California

Yesterday

Easy Apply

Contract

$80 - $90

San Jose, California

Yesterday

Easy Apply

Contract

$60 - $70

Los Angeles, California

6d ago

Easy Apply

Contract

Depends on Experience

Search all similar jobs