7AI
Security Analyst – Tier 2
Job Description
7AI is on a mission to put swarming AI agents in the hands of defenders to offload non-human work, shift people up, and finally focus on achieving the security outcomes that teams have been searching for. We are seeking curious, detail-oriented, technically adept Security Analysts who thrive on solving complex, high-stakes puzzles and are deeply customer-obsessed to continue our mission of building the world’s first Agentic Security Platform.
What You’ll Do:
-
Analyze and validate investigations completed by the AI Agents for accuracy, completeness, and risk
-
Correlate data from various data sources including cloud, endpoint, identity, network, etc. to understand the full picture of a malicious activity
-
Investigate malicious activity that the 7AI Agents responded to and understand the complexity of the attack that was stopped including the risk that was prevented for customers
-
Use our advanced AI Agents to hunt in customer environments to detect and remediate emerging threats, ultimately contributing to detections that will be folded back into the product
-
Assist customers with ongoing threat monitoring, triage, and prioritization of security alerts as needed but especially during incidents to resolve threats and secure the environment
-
Proactively identify potential threats and anomalies in customer environments by reviewing logs and malicious findings
-
Utilize your supreme communication skills to engage with customers who vary in their level of technical depth and focus (from SOC analysts to CISOs)
-
Architect processes while we build out this elite organization to scale the operation sustainably while maintaining consistent quality
-
Collaborate with the Engineering and Product teams, providing feedback on the customer experience and assist in optimizing and tuning the AI platform
-
Stay current with emerging cybersecurity trends, vulnerabilities, and new attack techniques, especially the field of AI-driven attacks
Required Qualifications:
-
2+ years of experience in Cyber Security Operations
-
Hands-on experience with investigating alerts and across multiple sources (endpoint, network, identity, email, cloud, etc.)
-
Strong understanding of security monitoring tools (XDR, SIEM, IDS/IPS, IDP, etc.)
-
Familiarity with log telemetry concepts
-
Experience analyzing and investigating security alerts from multiple sources, including intrusion detection systems, network monitoring tools, and endpoint protection platforms
-
Working knowledge of common attack techniques and frameworks (MITRE ATT&CK) and incident triage methodologies
-
Strong analytical and problem-solving skills, with the ability to verify AI-driven analysis and make independent security decisions
-
Data querying experience with SIEM querying technologies (SPL, KQL, FQL, SQL, etc) and familiarity with log / telemetry concepts
-
Familiarity with Malware Analysis methods
-
Great interpersonal skills with a service oriented mindset
-
Proven track record of successfully collaborating in a team
Preferred qualifications:
-
Prior experience in a Managed Services environment
-
Incident Handling experience
-
Relevant certifications: Security+, GSEC, GCIH