Security Operations Analyst II
Job Locations
US-Remote
Our Mission
Our mission is to SAVE AND IMPROVE LIVES BY EMPOWERING HEALTHCARE CONSUMERS.Come be part of remarkable.
Overview
How you can make a difference
The Security Operations Analyst II will be responsible for analyzing, identifying, and responding to emerging threats by supporting Cyber Threat Intelligence (CTI) functions and tactical response activities. In addition to evaluating security events and incidents, this role contributes to the development and enhancement of threat detections, investigative methods, and proactive threat hunting activities. As part of a converged security program, you will collaborate with teams across cybersecurity, physical security, privacy, fraud, enterprise risk, and incident/crisis management to improve the organization's defensive posture and ensure effective intelligence driven security operations.
What you'll be doing
Work a four day work week Wednesday - Saturday MT from 9 AM to 7 PM
Support coordination of HealthEquity's Security Operations Framework by contributing intelligencedriven analysis and aligning activities with NISTstandard incident management processes.
Analyze indicators, activity patterns, and suspicious behaviors related to cyber, privacy, DLP, fraud, and other risk areas, incorporating threat intelligence findings into investigations.
Provide daily analytical oversight of threat activity and work with platform owners to strengthen detections across enterprise security tools.
Assist with operational execution of investigative workflows and contribute to evaluating and enhancing detective controls.
Analyze suspicious emails, links, and files, incorporating CTI context to assess threat relevance, severity, and recommended response actions.
Document threat findings, analytic assessments, and investigative outcomes to maintain a comprehensive intelligence and incident activity log.
Collaborate with partner teams to support enterprise security initiatives and improve threatfocused processes, playbooks, and analytical standards.
Assist with developing and tuning threatdetection content (e.g., correlation rules, behavioral analytics, detections across EDR, email security, IDS, M365, AWS, CASB, SIEM, SOAR).
Perform threat hunts and work with the Cyber Intelligence team to proactively identify anomalous or malicious activity and emerging risks.
Support communication of threat insights, recommended mitigations, and tactical response actions to ensure timely and effective engagement from stakeholders.
Participate in an oncall response schedule during incidents, priority events, holidays, or weekends.
What you will need to be successful
Knowledge of basic IT and cybersecurity procedures and frameworks, or a closely related field as normally obtained through a Bachelor's Degree in Cybersecurity, a related field, or equivalent experience
Preferred Certifications: CHFI, any SANS GIAC certification, ECIH, CEH, Security+, Network+
Minimum of 2-3 years of experience in information security with specific experience in operations. Experience must include an understanding of information security concepts, industry tools, and standard methodologies.
Strong analytical ability and critical thinking application
Ability to independently triage, analyze, and respond to information security alerts, including decision making
A strong customer service orientation is essential
A passion for learning and demonstrated ability to adapt to the changing demands of business is crucial
#LI-Remote
This is a remote position.
Salary Range
$75,500.00 To $105,000.00 / year
Benefits and Perks
The actual compensation offer is determined based on job-related knowledge, education, skills, experience, and work... For full info follow application link.