Senior Cybersecurity Analyst

TENEX.AI
Sarasota, FL

Company Summary: TENEX.AI is an AI-native, automation-first, built-for-scale Managed Detection and Response (MDR) provider. We are a force multiplier for defenders, helping organizations enhance their cybersecurity posture through advanced threat detection, rapid response, and continuous protection. Our team is comprised of industry experts with deep experience in cybersecurity, automation, and AI-driven solutions. We’re a fast growing startup backed by industry experts and top tier investor Andreessen Horowitz. As an early employee, you’ll play a meaningful role in defining and building our culture. Get in on the ground floor. We’re a small but well-funded team that just raised a substantial round – joining now comes with limited risk and unlimited upside. We are rapidly growing and seeking top talent to join our mission of revolutionizing the cybersecurity landscape.

Job Summary: We are seeking a highly skilled and proactive Senior Cybersecurity Analyst to join our Security Operations Center (SOC) team. The ideal candidate will have a strong background in cybersecurity, leading and mentoring other team members, coupled with experience in leveraging AI and machine learning (ML) technologies, particularly in the context of Google’s SecOps platform (e.g. Google Chronicle), to enhance the detection, analysis, and response to security incidents. This role is integral to safeguarding digital infrastructure, ensuring rapid detection of threats, and supporting continuous improvement of security processes.

Location: This role will require onsite in our Sarasota, FL location.

Position Type: Full-Time (either day or night shifts available)

Key Responsibilities:

  • Threat Monitoring & Detection:

    • Monitor security alerts and events across the enterprise network, using both traditional cybersecurity tools and AI/ML-powered threat detection systems.

    • Perform triage, investigation, and correlation of security events to determine the severity and impact of potential threats.

    • Leverage Google Chronicle's capabilities for threat intelligence and log analysis, enhancing visibility and providing insights into potential security incidents.

    • Apply AI to identify patterns, anomalies, and behaviors indicative of potential security incidents, reducing false positives and improving detection accuracy.

    • Participate in on-call rotations and team scheduling for critical security incidents as needed.

  • Incident Response & Analysis:

    • Investigate and analyze security incidents and breaches, leveraging AI to automate initial analysis and enhance threat hunting efforts.

    • Respond to security incidents following established procedures, including containment, eradication, and recovery actions.

    • Conduct root cause analysis and forensic investigations to understand attack vectors and recommend mitigation strategies.

    • Utilize Google SecOps and Chronicle’s advanced tools to centralize security data, correlate events, and accelerate incident response workflows.

    • Apply machine learning algorithms to identify emerging threats and trends, providing actionable insights for incident response.

  • Google SecOps & Chronicle Integration:

    • Work with Google SecOps platform tools to streamline security operations, improve threat visibility, and automate workflows.

    • Collaborate with IT, Security, and Data Science teams to integrate Google Chronicle’s capabilities into the SOC, enhancing threat detection and incident resolution.

    • Optimize Google Chronicle for log management, threat hunting, and advanced analytics.

  • Security Automation:

    • Develop and maintain automated workflows for common security incidents, leveraging AI for intelligent decision-making and faster response times.

    • Automate routine SOC tasks such as log analysis, incident classification, and threat intelligence enrichment using Google SecOps and Chronicle integrations.

  • Reporting & Documentation:

    • Create detailed reports on incidents and threat intelligence summaries integrating AI-driven findings and insights.

    • Prepare regular performance and security posture reports for internal stakeholders, highlighting key AI-driven improvements and threat mitigation outcomes.

    • Generate and present reports on threat trends, and SOC operations for internal stakeholders and customers.

    • Provide recommendations for security improvements and contribute to SOC playbook development.

  • Collaboration & Knowledge Sharing:

    • Work closely with cross-functional teams (e.g., IT, Customer Success, Engineering) to promote and improve AI-driven security initiatives and improve the customers' overall security posture.

    • Share knowledge of AI-powered security techniques and Google SecOps tools with SOC team members to enhance their capabilities in threat detection and incident response.

Qualifications:

  • Education: Bachelor’s degree in Computer Science, Information Security, or a related field, or equivalent work experience. Relevant certifications (e.g., CISSP, CISM, CEH) are a plus.

  • Experience:

    • 4+ years of experience in a Security Operations Center (SOC) or a similar security-focused role.

    • Hands-on experience with security analytics, log management, threat hunting, and incident response.

    • Interest in applying automation and/or artificial intelligence and machine learning techniques to cybersecurity tasks, such as threat detection, anomaly detection, and security automation.

  • Technical Skills:

    • Strong understanding of cybersecurity concepts and frameworks (e.g., NIST, Mitre, ISO, Killl Chain).

    • Experience with tools for cybersecurity, such as intrusion detection systems (IDS), SIEM tools, and security automation platforms.

    • Proficiency in scripting languages (e.g., Python, PowerShell) for automation and integration.

    • Knowledge of security technologies such as firewalls, endpoint protection, IDS/IPS, and threat intelligence platforms.

  • Soft Skills:

    • Strong analytical and problem-solving skills.

    • Excellent communication skills for interacting with internal teams and external customers.

    • Ability to work under pressure in a fast-paced, dynamic environment.

Preferred Skills:

  • Experience with security orchestration, automation, and response (SOAR) platforms.

  • Exposure to cloud security platforms (e.g., AWS, Azure, Google Cloud) and the associated risks.

  • Practical experience working with Google SecOps tools and Chronicle for centralized threat intelligence and event correlation a plus.

  • Hands-on experience with the Microsoft security platform (Sentinel, Defender) is a plus.

Why Join Us?

  • Opportunity to work with cutting-edge AI-driven cybersecurity technologies and Google SecOps solutions.

  • Collaborate with a talented and innovative team focused on continuously improving security operations.

  • Competitive salary and benefits package.

  • A culture of growth and development, with opportunities to expand your knowledge in AI, cybersecurity, and emerging technologies.

If you're passionate about combining cybersecurity expertise with artificial intelligence and have experience with Google SecOps and Chronicle, we encourage you to apply!

Posted 2025-11-25

Recommended Jobs

Corporate Director of Sales for High Volume Hospitality Group

The Ginger Brands
Lighthouse Point, FL

Corporate Director of Sales for High Volume Hospitality Group Location Lighthouse Point, FL : Job Summary : Director of Sales Position Overview: We are seeking a highly skilled and experienced Dire…

View Details
Posted 2026-01-08

Sales Associate

Petland Miami
Miami, FL

1 JOB TITLE: Sales Manager REPORTS TO: General Manager SUMMARY: The Sales Manager is responsible for developing a positive Petland culture on the sales floor that results in a team of Pet Counselors d…

View Details
Posted 2026-01-08

Trade Compliance

Appletree Global Consulting
Melbourne, FL

JOB #. 83421790 Industry: Aerospace / Aviation / Defense Job Category: Legal – Other Legal WORK Details: Job Schedule: 9/80 Employees work 9 out of every 14 days – totaling 80 …

View Details
Posted 2026-01-03

Digital Communication Sales Specialist

GearUp2Success
Sunrise, FL

Remote | Flexible | High-ticket | Performance-Based We're presenting a distinct opportunity for motivated individuals to become part of our team. This offers the freedom to work independently, wit…

View Details
Posted 2025-11-13

Registered Nurse - Emergency Department, Nights - RN

Mayo Clinic
Jacksonville, FL

City Jacksonville State FL Remote NO Department Nursing Why Mayo Clinic Mayo Clinic is top-ranked in more specialties than any other care provider according to U.S. News & World …

View Details
Posted 2025-12-18

Host / Hostess

Waffle House, Inc.
Tampa, FL

At Waffle House, we are not in the food business. We are in the People Business and we are hiring immediately for full time and part time servers (all shifts). Being in the People Business, we don’t…

View Details
Posted 2026-01-10

Specialist, Shared HR Services & Strategy Travel

Royal Caribbean Group
Miami, FL

Journey with us!  Combine your career goals and sense of adventure by joining our exciting team of employees. Royal Caribbean Group is pleased to offer a competitive compensation and benefits package…

View Details
Posted 2026-01-09

Accounting Consultant

Saint Petersburg, FL

Description Hybrid role onsite 3 days M-F 40 Hours week, 7-8AM – 4-5PM Laptop and equipment provided Job Summary: This person will be responsible for providing administrative / basic acco…

View Details
Posted 2026-01-09

Fire Alarm Technician and Installer

Yellowstone Local
Winter Park, FL

Keep Comfortable Away From Your Comfort Zone Yellowstone Local is proud to represent Lane Electronics & Alarm Systems Inc., an industry leader in low-voltage security and life safety solutions. …

View Details
Posted 2026-01-08