Job Title: AI SecOps & Detection Lead - Discovery, Response & Prevention
Location: 100% Remote
Duration: 3 Months Contract
Experience level: 8 Years
Any visa works
This role builds and operates the AI security lifecycle across the organization, structured around three core questions: do we have full visibility into AI in use across our environment, can we effectively react and respond when something goes wrong, and are we feeding what we learn back into preventative measures. The lead integrates AI-specific findings from tools like Wiz and AIM into existing SOC workflows so that AI-related events are detected and triaged alongside everything else, not sitting in a separate queue. This person stands up shadow AI discovery so the organization is not relying on self-reporting to know what is out there, and develops the AI-specific incident response playbooks and tabletop exercises that ensure the SOC is ready when an AI-related incident hits. On the prevention side, this role closes the loop, translating discovery findings and incident patterns into actionable remediation requests and tighter controls in partnership with teams across the organization. This person also supports the operational governance that keeps the program auditable, maintaining the AI tool inventory, risk assessments, and documentation trail in coordination with internal leadership. To perform all of these tasks the role will partner closely with the SOC, engineering, compliance, and security leadership Required Skills - Expert with Dell Isilon Expert with Superna used in conjunction with Isilon Strong multiprotocol understanding (SMB/NFS used simultaneously) Multiprotocol permissions cleanup and best practices Automation and scripting Job Duties - Manage storage environments including NAS, SAN, and object storage platforms Monitor and optimize storage performance, utilization, and system availability Perform storage provisioning, migrations, upgrades, patching, and lifecycle management Configure and maintain replication, snapshots, backup integration, and disaster recovery solutions Collaborate with infrastructure, virtualization, and backup teams Develop and maintain storage documentation and operational procedures Troubleshoot complex storage, replication, connectivity, and performance issues Recommend improvements for storage architecture and performance Automate storage administration tasks using scripting or infrastructure automation tools
Job Requirements -
Required Skills
- Enterprise Security Operations (SecOps): Expertise in SIEM/SOAR, detection engineering, and incident response.
- Asset Discovery & Telemetry Mapping: Ability to build discovery programs for cloud and on-prem AI tools.
- AI Threat Landscape Expertise: Knowledge of AI-specific vectors like prompt injection and model poisoning.
- Workflow Integration: Skill in embedding specialized security findings into unified SOC workflows.
- Metrics-Driven Risk Management: Ability to quantify detection efficacy and identify coverage gaps.
Key Duties
- Unify SOC workflows by integrating AI-specific alerts.
- Implement automated shadow AI discovery mechanisms.
- Develop tailored AI incident response playbooks and lead tabletop exercises.
- Drive preventative remediation based on discovery insights.
- Maintain operational governance and auditable documentation.