Associate Security Solution Analyst
Utah, United States
⚠️ We'll shut down after Aug 1st - try foo🦍 for all jobs in tech ⚠️
Full Time Mid-level / Intermediate USD 38K - 72K
Proofpoint
Proofpoint helps protect people, data and brands against cyber attacks. Offering compliance and cybersecurity solutions for email, web, cloud, and more.About Us:
We are the leader in human-centric cybersecurity. Half a million customers, including 87 of the Fortune 100, rely on Proofpoint to protect their organizations. We’re driven by a mission to stay ahead of bad actors and safeguard the digital world. Join us in our pursuit to defend data and protect people.
How We Work:
At Proofpoint, you’ll be part of a global team that breaks barriers to redefine cybersecurity, guided by our BRAVE core values: Bold in how we dream and innovate, Responsive to feedback, challenges, and opportunities, Accountable for results and best-in-class outcomes, Visionary in future-focused problem-solving, Exceptional in execution and impact.
Corporate Overview
Proofpoint is a leading cybersecurity company protecting organizations’ greatest assets and biggest risks: vulnerabilities in people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber-attacks. Leading organizations of all sizes, including more than half of the Fortune 1000, rely on Proofpoint for people-centric security and compliance solutions mitigating their most critical risks across email, the cloud, social media, and the web. We are singularly devoted to helping our customers protect their greatest assets and biggest security risk: their people. That’s why we’re a leader in next-generation cybersecurity.
The Role
The Associate Security Solution Analyst will be responsible for reporting and advanced analytics for ALL alerts that are generated by Proofpoint's TRAP, CTR solutions and Security Incident Event Management (SIEM), this may also include other Proofpoint Products. They will perform historical correlation analysis on incidents and events generated inside of the environments. They will also be responsible for the building of and maintenance of escalation work flows and providing feedback on request. This includes participation in annual information and network security training and acceptance of spot checks on an ad hoc basis to guarantee that Proofpoint is constantly improving upon the organization’s ISMS. Each member of our team must understand the importance of the ISMS and the subsequent handling of client data.
This role will be shift based: US Mount Time 9am - 6pm
Your day-to-day
· The Associate Security Solution Analyst will be responsible for triaging for ALL alerts that are generated by Proofpoint's TRAP, CTR solutions and Security Incident Event Management (SIEM), this may also include other Proofpoint Products.
· They will also be responsible for the building of and maintenance of escalation work flows and providing feedback on request.
· Ops Check of managed Proofpoint tools
· Reviewing of Proofpoint TAP red banner alerts
· Provide feedback recommendations to the Client Service Manager
· Presentation of reports and advanced analytics findings when required
· Attendance at all routine client meetings and prep-meetings for Proofpoint Clients
· Overall Responsibility for any non-engineering client requests.
· Assist in identifying opportunities for new alarms policies
· Maintenance of runbooks/Proofpoint documentation (i.e. alarm workflows, escalation procedures, team details, client knowledge base)
Job Requirements
· Knowledge of Phishing technology and functions of some security tools that protect/prevent end users against them
· Knowledge of SIEM technology and functions of some security tools
· Experience working with interpreting, tuning, searching and manipulating data within SIEM
· Experience working with interpreting, searching and understanding the backdown of the structure of an email
· The ability to demonstrate understanding of what a phishing email is, how to spot on and what ramification could be to an end user/company if not stopped
· Knowledge or experience utilizing the Cyber Kill Chain, Diamond Model or other appropriate models
· Experience in gathering and managing threat intelligence
· Ability to present a recommended remediation strategy to client in professional format
· Basic knowledge of cyber security threats and the ability to explain the impact they have to a user/company
Nice to have
· Windows administration experience
· Sec+
This posting is anticipated to remain open until August 31st, 2025
Why Proofpoint? At Proofpoint, we believe that an exceptional career experience includes a comprehensive compensation and benefits package. Here are just a few reasons you’ll love working with us:
• Competitive compensation
• Comprehensive benefits
• Learning & Development: We are committed to the growth and development of our team members, offering a range of programs including leadership and professional development workshops, stretch project assignments, and mentoring opportunities to help employees reach their full potential.
• Flexible work environment: [Remote options, hybrid schedules, flexible hours, etc.].
• Annual wellness and community outreach days
• Always on recognition for your contributions
• Global collaboration and networking opportunities
Our Culture:
Our culture is rooted in values that inspire belonging, empower purpose and drive success-every day, for everyone. We encourage applications from individuals of all backgrounds, experiences, and perspectives. If you need accommodation during the application or interview process, please reach out to accessibility@proofpoint.com. How to Apply Interested? Submit your application here https://www.proofpoint.com/us/company/careers. We can’t wait to hear from you!
Consistent with Proofpoint values and applicable law, we provide the following information to promote pay transparency and equity. Our compensation reflects the cost of labor across several U.S. geographic markets, and we pay differently based on those defined markets as set out below. Pay within these ranges varies and depends on job-related knowledge, skills, and experience. The actual offer will be based on the individual candidate. The range provided may represent a candidate range and may not reflect the full range for an individual tenured employee. This role may be eligible for variable compensation and/or equity. We offer a competitive benefits package, including flexible time off, a comprehensive well-being program with two paid Wellbeing Days and two paid Volunteer Days per year, plus a three-week Work from Anywhere option.
Base Pay Ranges:
SF Bay Area, New York City Metro Area:
Base Pay Range: 26.19 - 36.01 USDCalifornia (excludes SF Bay Area), Colorado, Connecticut, Illinois, Washington DC Metro, Maryland, Massachusetts, New Jersey, Texas, Washington, Virginia, and Alaska:
Base Pay Range: 20.65 - 28.40 USDAll other cities and states excluding those listed above:
Base Pay Range: 19.58 - 26.92 USDTags: Analytics Cloud Compliance Cyber Kill Chain ISMS Network security SIEM Strategy Threat intelligence Vulnerabilities Windows
Perks/benefits: Career development Competitive pay Equity / stock options Flex hours Flex vacation Team events Transparency
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.