Senior Security Analyst

IT Security Houston, Texas


  • Job Category:

    IT Security

  • Location:

    Houston, Texas

  • Job Type:

    Regular

  • Number of Openings:

    1

Description

Position at Tokio Marine HCC

Senior Security (SOC) Analyst
Location: Houston, TX (In Office)
Position Type: Full-Time    
   
About TMHCC: 
Tokio Marine HCC is the solution to a world that is changing at a pace not seen before. This is not traditional insurance – this is deeply technical and analytical business expertise that makes our clients businesses triumph over their competition. We provide support during unpredicted events, which means our clients’ businesses progress at their desired pace. Our entire company structure is designed to empower our teams and individuals to guide our clients’ critical decisions without bureaucracy and delay. TMHCC’s parent company – Japan-based Tokio Marine Group – underpins and champions our growth innovation and steadfast commitment to our customers, while our flat and decentralized structure means every voice speaking on behalf of the customer is heard. And those voices are the best and brightest talent in the industry, working with the most innovative tools for collaboration, technology, and data. Our clients’ success is the priority of every employee at TMHCC.    

About the role:
The security team at TMHCC is seeking an experienced and enthusiastic senior analyst to join the team. What you will do here matters. Mentor junior analysts, assist in the development and deployment of both day-to-day and enterprise-wide strategic planning, and use your knowledge and experience to enhance our cybersecurity posture, mitigate risks, and safeguard our organization's assets.   
   
Key Responsibilities:   
  • Lead and coordinate incident response efforts, investigating and resolving security incident.
  • Develop and refine SIEM correlation rules and alerts.
  • Utilize PowerShell and Python scripting to automate repetitive tasks, streamline processes, and enhance efficiency within the SOC.
  • Leverage regex patterns to parse and analyze log data for threat detection and correlation.
  • Conduct proactive threat hunting activities.
  • Collaborate with cross-functional teams in implementing security best practices and enhancing the overall security posture.
  • Up to date on the latest cybersecurity trends, threats, and vulnerabilities. 
    
Skills and Experience: 
Essential:    
  • 5 or more years experience in a SOC environment, focusing on incident response and threat detection.
  • Proficiency in SIEM platforms and experience tuning and optimizing SIEM rules and queries.
  • Strong scripting skills in PowerShell and Python.
  • In-depth knowledge of regex for log parsing and pattern matching.
  • Experience with threat hunting methodologies and tools.
  • Excellent analytical and critical thinking skills.
  • Effective communication skills in mentoring, teaching, and explaining technical concepts to all stakeholders. 
  • Experience with cloud IR, logging, and detection. 
Desirable:   
  • 4 Year / bachelor’s degree in relevant field (CS, Cybersecurity, etc.)
  • Certifications like Sec+, GIAC, or equivalent are highly desirable. 
  
   
   
#LI-TH1