Stratascale Sr. Security Consultant - Identity Management

Job Locations US-Remote
Requisition ID
2024-18391
Approved Min (Total Target Comp)
USD $165,000.00/Yr.
Approved Max (Total Target Comp)
USD $205,000.00/Yr.
Compensation Structure
Base Plus Bonus
Category
Technical Presales/Post Sales

Job Summary

The Sr. Security Consultant – Operations will play a vital role in ensuring our client’s incidents are investigated, triaged, or action taken to remediate the incident. Their primary responsibility will be to support the alert management and incident handling process across multiple platforms and security technologies while providing in-depth analysis of alerts for our clients.  

  

The Sr. Security Consultant will ensure timely investigation, actioning, and escalation of alerts using their expertise in incident handling, MDR, and SIEM technologies. They will guide clients through threat mitigation, perform threat-hunting activities, and review clients' defense strategies for process improvements. Additionally, they will contribute to policy development, stay up to date with cybersecurity threats and mitigation techniques, and maintain high cybersecurity standards. Adapting to evolving security landscapes is crucial to your success in this role.  

  

This role will report to the Practice Manager - Network Security Operations within Stratascale.

 

This position is remote with a Home Office setup as determined by Stratascale management. 

About Us

Stratascale_Symbol_FullColor (002)

As a digital and cybersecurity services company, Stratascale exists to help the Fortune 1000 transform the way they use technology to advance the business, generate revenue, and respond quickly to market demands. We call it Digital Agility.

To learn more about how we’re shaping the future of digital business and a more secure world, visit stratascale.com.

Responsibilities

Includes, but not limited to:

 

  • Support incident handling processes across multiple platforms and security technologies, including Windows, Linux, and macOS.  
  • Provide level 2 escalation point for incident triage, investigation, and response. 
  • Provide in-depth analysis of escalated requests from clients or their Managed Detection & Response (MDR) services.  
  • Validate suspicious events by performing investigations using SIEM and SOAR technologies, leveraging threat intelligence and OSINT, TTPs, and IOCs.  
  • Identify gaps in client environments, data ingestions, or configuration errors that reduce the quality of security alerts.  
  • Work with clients and leadership to surface and resolve concerns around the security program.  
  • Provide support to Security Analysts, including coaching and training as necessary. 
  • Leverage your knowledge of Alert Triage, SOC Operations, and Depth in Defense strategies to contribute to projects for overall client success  
  • Produce high-quality written and verbal communications, recommendations, and findings to client management on time  
  • Address improvement opportunities within Stratascale for automation and process improvements.  
  • Provide the client with a complete understanding of the investigations and suggest corrective actions to resolve alerts.  
  • Participate in developing cross-practice training or delegate training to team members on practice discipline capability, associated offerings, industry positioning, and selling strategies.  
  • Provide off-hours support for Alert Management – as assigned. 
  • Provide subject matter expertise on IAM PAM specific capabilities to help customers design and implement Identity solutions such as but not limited to: Access Management, Governance and Attestation; Privileged access management, Multifactor/Single Sign On

Qualifications

  • 5-8 years of experience in alert management across multiple SIEMs such as Splunk, Log Rythm, and Sentinel.   
  • 5-8 years of experience in alert tuning, threat detection, and incident response
  • 5-8 years of experience with cyber security principles, concepts, and practices, including the ability to perform a complete and thorough incident investigation and triage with limited support.  
  • 5-8 years of experience working with modern SOC solutions to include, but not limited to SIEM, EDR, Firewalls, Cloud Providers, Web Applications, etc.
  • Expertise with CyberArk

Required Skills

  • Strong fundamental understanding of technical security solutions and how they address client risk exposure and solve key use cases.  
  • Strong problem-solving capabilities with the ability to analyze complex data, identify patterns, and develop strategic solutions.  
  • Demonstrate the ability to pivot to other log sources, cloud systems, or consoles to perform a comprehensive analysis from multiple data sources  
  • Proactive and self-motivated mindset  
  • Ability to work effectively and add value as a team member for the practice discipline.  
  • Excellent verbal and written communication skills, with the ability to effectively explain technical concepts to non-technical individuals and communicate with clients.   
  • Ability to train and disseminate information within an area or operation and work effectively within all levels of an organization, both internally and externally  
  • Ability to engage and discuss technical and non-technical concepts with many client audience types, including C-Suite, VP/Director, Architect, Engineer, and Analyst resources.  
  • Poses an ability to simplify and explain complex problems to stakeholders of all levels across multiple functions.  
  • Entrepreneurial mindset with the ability to identify value in unstructured situations.  
  • Emotional intelligence, flexible work style, and excellent diplomatic skills across all levels of the organization  
  • Attention to detail, organization, and follow-up skills are critical.    
  • Initiative to research and resolve problems with a positive attitude.  
  • Excellent presentation skills and comfortable leading meetings and discussions  
  • Ability to mentor and guide others.  

Certifications Required

Certifications below are preferred but not required: 

  • Industry certifications:
    • CISSP
    • CIAM
    • CISM / CISA / CRISC
    • GIAC (GSEC)
  • Vendor Solutions and product-specific certifications:
    • Okta / Ping / ForgeRock / Auth0
    • Sailpoint
    • Thales
    • CyberArk / Thycotic / Centrify / Saviynt / Venifi

Unique Requirements

  • Attend virtual customer meetings when appropriate  
  • Travel to customer sites, partner sites, conferences and Stratascale offices up to 10% annually  
  • Candidate will need to have access to an international airport

Additional Information

  • The estimated annual pay range for this position is $165,000 - $205,000 which includes a base salary and bonus. The compensation for this position is dependent on job-related knowledge, skills, experience, and market location and, therefore, will vary from individual to individual. Benefits may include, but are not limited to, medical, vision, dental, 401K, and flexible spending.
  • Equal Employment Opportunity – M/F/Disability/Protected Veteran Status

Compensation Structure

Base Plus Bonus

Approved Min (Total Target Comp)

USD $165,000.00/Yr.

Approved Max (Total Target Comp)

USD $205,000.00/Yr.

Options

Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
Share on your newsfeed

Need help finding the right job?

We can recommend jobs specifically for you! Click here to get started.