Sr. Security Operations Analyst
South San Francisco, California, United States
Full Time Senior-level / Expert USD 140K - 155K
Xaira Therapeutics
About Xaira Therapeutics
Xaira is an innovative biotech startup focused on leveraging AI to transform drug discovery and development. The company is leading the development of generative AI models to design protein and antibody therapeutics, enabling the creation of medicines against historically hard-to-drug molecular targets. It is also developing foundation models for biology and disease to enable better target elucidation and patient stratification. Collectively, these technologies aim to continually enable the identification of novel therapies and to improve success in drug development. Xaira is headquartered in the San Francisco Bay Area, Seattle, and London.
About the Role
At Xaira, we are seeking a Sr. Security Operations Analyst with deep expertise in security threat monitoring, detection, and incident response, particularly in cloud-based environments. As a key member of Xaira’s security team, you will play a critical role in protecting and safeguarding our information assets, ensuring our systems and networks remain resilient against cyber threats and data breaches.
You should be highly adaptable, proactive, and capable of working in a fast-paced environment, ready to address shifting priorities as needed. Creativity and out-of-the-box thinking will be essential as you work to continuously improve threat intelligence, security monitoring, detection, and response capabilities.
Key Responsibilities
- Serve as a subject matter expert in threat detection, analysis, hunting, and response across Xaira’s Cloud and Corporate IT environments.
- Analyze and correlate actionable security events and alerts, performing network traffic analysis using raw packet data, NetFlow, IDS/IPS, SIEM, and other security tools.
- Actively participate in Security Incident Response Team (SIRT) activities, ensuring timely detection, containment, eradication, and recovery from security incidents.
- Develop and maintain Incident Response Plans and Procedures, including runbooks for responding to critical security events.
- Investigate and analyze threat campaigns, lateral movements, and indicators of compromise (IOCs) to improve security posture.
- Interface with external organizations, including law enforcement, intelligence agencies, and government bodies, as required.
Qualifications
- Bachelor’s degree in Computer Science, Information Systems, or a related technical field.
- 5+ years of experience in security operations, threat intelligence, hunt teams, or incident response.
- 3+ years of hands-on experience with public cloud environments (AWS, Azure, or GCP).
- Proficiency in multiple security technologies, including:
- IDS/IPS, SIEM, Log Analysis (Windows, Linux, Web Servers, FIM)
- NextGen Firewalls, NextGen AV, WAFs
- Network/User Behavior Analysis tools
- Network Packet Analyzers & Visibility tools
- 3+ years leading cybersecurity incident response as an Incident Response Engineer or Analyst in an enterprise environment.
- Strong knowledge of the Incident Response lifecycle, including forensic investigations and enterprise security operations.
- Expertise in TCP/IP protocol suite, security architecture, and hardening operating systems, networks, databases, and applications.
- Experience developing and maintaining security operations playbooks, runbooks, and IR plans.
- Familiarity with forensic tools and techniques for attack reconstruction, including forensic analysis and volatile data collection (preferred).
- In-depth understanding of threat landscapes, attack vectors, vulnerabilities, and malicious actor techniques.
- Excellent verbal and written communication skills, with the ability to clearly document and explain technical details and incident reports.
Compensation
We offer a competitive compensation and benefits package, seeking to provide an open, flexible, and friendly work environment to empower employees and provide them with a platform to develop their long-term careers. A Summary of Benefits is available for all applicants. We offer a competitive package that includes base salary, bonus, and equity. The base pay range for this position is expected to be $140,000 - $155,000 annually; however, the base pay offered may vary depending on the market, job-related knowledge, skills and capabilities, and experience.
Xaira Therapeutics an equal-opportunity employer. We believe that our strength is in our differences. Our goal to build a diverse and inclusive team began on day one, and it will never end.
TO ALL RECRUITMENT AGENCIES: Xaira Therapeutics does not accept agency resumes. Please do not forward resumes to our jobs alias or employees. Xaira Therapeutics is not responsible for any fees related to unsolicited resumes.
Tags: AWS Azure Cloud Computer Science Firewalls GCP Generative AI IDS Incident response IPS Linux Log analysis Monitoring SIEM TCP/IP Threat detection Threat intelligence Vulnerabilities Windows
Perks/benefits: Competitive pay Equity / stock options Flex hours Salary bonus Startup environment Team events
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.