Security Operations Analyst

New York

Bullish

Bullish is a regulated and audited global cryptocurrency exchange where you can securely buy, sell and trade digital assets including Bitcoin and Ethereum. Trade perpetual futures.

View all jobs at Bullish

Apply now Apply later

Focused on developing products and services for the digital assets sector, Bullish has rewired the traditional exchange to benefit asset holders, enable traders and increase market integrity. Supported by the group’s treasury, Bullish’s new breed of exchange combines deep liquidity, automated market making and industry-leading security and compliance to increase the accessibility of digital assets for investors. Bullish exchange is operated by Bullish (GI) Limited and is fully regulated in Gibraltar.

Mission: To make trading with digital assets more rewarding and secure.​

Vision: To be the most innovative, respected, and trusted leader in crypto.

Reports to:

Head of Security Engineering

Position Overview

Bullish is seeking a Security Operations Analyst to join our global security operations and incident response team. In this highly critical role, you will be responsible for monitoring and analyzing security incidents, responding to threats in real-time, and ensuring the integrity of our systems and platforms. Your expertise will help identify vulnerabilities and enhance our security posture through proactive measures and collaboration with cross-functional teams. This position requires a keen analytical mindset, a strong understanding of security technologies, and the ability to thrive in a fast-paced environment. 

This position will be required to work onsite full-time from our NYC office based near Union Square.

Responsibilities

  • Work closely with the SOC Manager across daily activities of the Bullish Security Operations Center (SOC) to ensure Service Level Objectives are achieved. 

  • Continuously monitor security alerts and incidents using SIEM tools and other security technologies.

  • Create detection use cases in the SIEM, analyze security event data for proactive threat hunting, and conduct research on the latest threats and vulnerabilities to enhance incident response readiness and capabilities.

  • Respond to security incidents, performing initial analysis and escalation as necessary.

  • Participate in incident response planning and execution, ensuring timely containment and remediation of security breaches.

  • Research and analyze emerging threats and vulnerabilities to adapt security measures accordingly.

  • Collaborate with threat intelligence teams to integrate relevant information into security operations.

  • Document security incidents, identify gaps from incidents and recommend improvements, develop and maintain incident response plans and SOPs.

  • Prepare detailed reports for stakeholders on security incidents and trends.

  • Work closely with cross functional technical teams to ensure the security of systems and data.

  • Participating in the on-call rotation for after-hours coverage, which include responding to security incidents, performing containment and forensic investigations

Qualifications

  • BS/BA degree in Cyber Security/Computer Science or equivalent combination of related work experience desired.

  • CISSP, CISM, GCIA, GCIH, GCFE, GCFA, GREM, Splunk Power User and/or similar certifications is preferred

  • 3+ years of verifiable experience in Security Operations and Incident Response.

  • Experience in performing analysis with SIEM technologies such as Splunk and/or Google Chronicle.

  • Experience in performing proactive and reactive threat hunting using MITRE ATT&CK or similar frameworks.

  • In-depth understanding and working knowledge of security appliances/tools such as host-based and network-based IDS/IPS, WAF, EDR, etc.

  • Very strong understanding of networking protocols, operating systems and cyber security concepts and technologies.

  • Experience in forensic tools and malware analysis is a plus.

  • Experience with Cloud environments such as AWS/GCP/Azure is a plus.

  • Ability to work across different regions in a process/procedure driven organization.

  • Excellent verbal and written communication and presentation skills.

Bullish is committed to offering competitive compensation and benefits. The anticipated base salary for this position is $100,000 - $120,000 + discretionary annual target bonus + performance incentives/benefits. Offered salary may vary based on geographic location, including city and state, and will be reflective of job-related knowledge, skills and commensurate experience.

Bullish is proud to be an equal opportunity employer. We are fast evolving and striving towards being a globally-diverse community. With integrity at our core, our success is driven by a talented team of individuals and the different perspectives they are encouraged to bring to work every day.

Apply now Apply later
Job stats:  3  1  0

Tags: AWS Azure CISM CISSP Cloud Compliance Computer Science Crypto EDR GCFA GCFE GCIA GCIH GCP GREM IDS Incident response IPS Malware MITRE ATT&CK Monitoring SIEM SOC Splunk Threat intelligence Vulnerabilities

Perks/benefits: Competitive pay Salary bonus

Region: North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.