Security Operations Analyst
VerSprite
VerSprite is an Inc. 5000 2020 fastest growing company and industry leader in PASTA threat modeling. Founded in 2007, VerSprite is a private cybersecurity consulting firm helping organizations tighten their risk-gaps with evolved security solutions and advanced threat intel tools.
VerSprite has a 97% client retention rate providing organizations with services like penetration tests, evolved red teaming engagements, vCISO, vSOC and VerSprite’s advanced security tools Cloud Security Assessment Platform and Cyber Threat Intelligence Portal.
Security Operations Analyst
enterprise mssp | ai-augmented soc | detection engineering focus
Location:
Remote Costa Rica or Argentina (u.s. time zone alignment required)
Who we are:
We operate a next-generation, ai-augmented security operations center supporting enterprise clients across multiple industries. This is not a traditional alert-triage soc role.
Our analysts investigate sophisticated threats, engineer high-fidelity detections, leverage ai to accelerate analysis, and continuously improve how security operations are executed across multiple client environments.
If you are looking to simply manage a queue, this is not the role.
If you want ownership over investigation quality, detection precision, and automation impact…keep reading.
What you will own
enterprise-grade investigations
- lead structured investigations across siem, edr, email security, and cloud telemetry
- determine root cause and blast radius — not just close alerts
- correlate telemetry with threat intelligence to assess impact
- deliver clear, executive-ready findings tailored to enterprise stakeholders
- support containment, eradication, and recovery efforts
detection engineering & threat hunting
- develop and tune siem detection rules across multiple environments
- create and refine yara rules for malware detection
- engineer new detection use cases aligned to emerging threats
- conduct hypothesis-driven threat hunts
- reduce false positives through precision tuning
- map detections to mitre attack where appropriate
you will influence detection quality directly, not just consume alerts.
ai-augmented analysis & automation
- leverage ai tooling to accelerate log analysis and enrichment
- validate ai outputs and refine workflows
- identify repetitive investigative tasks suitable for automation
- collaborate on operationalizing ai-assisted playbooks
- increase efficiency without sacrificing analytical rigor
ai is an accelerator, not a substitute for judgement.
continuous improvement
- conduct post-incident detection gap reviews
- translate lessons learned into measurable detection improvements
- contribute to knowledge base and investigation standards
- track and improve operational performance metrics
Required Technical Experience
- hands-on experience with at least one major siem platform (splunk, sentinel, elastic, google secops, qradar, etc.)
- experience with edr/xdr platforms (crowdstrike, sentinelone, defender, etc.)
- detection rule creation or tuning experience
- experience writing or modifying yara rules
- understanding of windows, linux, and cloud telemetry
- threat intelligence and ioc handling experience
- incident response lifecycle familiarity
- scripting capability (python, powershell, or similar)
- strong written english for client-facing reporting
It would be great if you have
- mssp or multi-tenant enterprise experience
- soar exposure
- mitre att&ck mapping experience
- cloud security investigation (aws/azure/gcp)
- experience reducing false positives at scale
- experience using ai tools in investigation workflows
- malware analysis fundamentals
we value
- ownership over outcomes
- analytical discipline
- technical curiosity
- clear business communication
- calm under pressure
- comfort operating across multiple enterprise environments
If you want to grow beyond traditional soc boundaries and help shape modern security operations, we want to meet you.
Benefits
We offer a competitive compensation package where you’ll be recognized for the value you bring to our business, along with:
- Opportunities to develop new skills and progress your career;
- The freedom and flexibility to handle your role in a way that’s right for you; and
- A collaborative environment where everyone works together to create a better working world
If this seems intriguing to you, please apply! We will reach out promptly to discuss your fit and additional job details.