Senior IT Security Operations Engineer Opportunity

enrollhere, inc. company

Subscribe to our Telegram & Twitter Channel

Senior IT Security Operations Engineer in United State

Remote 1 day ago

Enroll Here is on a mission to make healthcare enrollment simple, transparent, and accessible for everyone. We partner with organizations nationwide to deliver streamlined technology and exceptional customer experiences, ensuring members can access the coverage they need with confidence. Our fully remote team thrives on collaboration, innovation, and a shared commitment to improving the enrollment journey for all.

The Senior IT Security Operations Engineer is responsible for strengthening and managing Enroll Here's security operations function—detecting, investigating, and responding to security incidents, optimizing monitoring and defense mechanisms, and leading proactive threat detection and response initiatives.

This role will serve as a senior individual contributor and trusted technical leader, helping drive the maturity of the Security Operations Center (SOC), automation, metrics, playbooks, and cross-functional collaboration to ensure the confidentiality, integrity, and availability of Enroll Here's systems and data.

Responsibilities

Operational Security & Incident Response

  • Monitor, detect, analyze, and respond to security events and incidents using SIEM, EDR, IDS/IPS, and network analytics tools
  • Lead or participate in incident response, root cause analysis, post-incident reviews, and remediation planning
  • Triage alerts, assess severity, contain threats, and coordinate with IT, networking, and application teams to drive resolution
  • Continuously improve detection capabilities and tune alerts to enhance accuracy and reduce false positives

Threat Hunting & Proactive Defense

  • Conduct proactive threat hunting across endpoints, networks, logs, cloud, and identity environments
  • Integrate threat intelligence feeds into detection logic and analytics
  • Develop and maintain custom detection rules, scripts, and playbooks to strengthen defenses

Logging, Monitoring, & Automation

  • Design, maintain, and optimize logging and monitoring architecture, ensuring scalability and performance
  • Manage security tooling such as SIEM, EDR, UEBA, SOAR, and threat intelligence platforms
  • Automate detection and response workflows using scripts, APIs, or orchestration tools

Processes, Playbooks, & Documentation

  • Create and enhance incident response playbooks, standard operating procedures, and runbooks
  • Establish key metrics, dashboards, and KPIs to measure SOC performance and maturity
  • Conduct regular tabletop exercises and maintain documentation for audit readiness

Governance, Risk & Compliance

  • Partner with GRC teams to align security operations with regulatory and contractual obligations (HIPAA, PCI, NIST, etc.)
  • Provide evidence and reporting for audits and risk assessments
  • Support prioritization of security initiatives through operational risk insights

Collaboration & Leadership

  • Mentor junior team members and guide investigations within the SOC
  • Act as a liaison with IT, cloud, and engineering teams to integrate security controls throughout the tech stack
  • Engage vendors and MSSPs to evaluate tools, share threat intelligence, and improve operational efficiency

Present to leadership on security posture, incidents, and ongoing improvements.

Requirements

Required:

  • Bachelor's degree in Computer Science, Information Security, IT, or related field
  • 5-8+ years of experience in cybersecurity, including Security Operations, Incident Response, or SOC roles
  • Hands-on experience with tools such as SIEM, EDR, IDS/IPS, and network monitoring
  • Skilled in incident handling, investigation, and root cause analysis
  • Strong scripting/automation skills (Python, PowerShell, Bash)
  • Deep understanding of logs, protocols, network fundamentals, and data analysis
  • Familiarity with cloud security (AWS, Azure, GCP)
  • Strong analytical, investigative, and communication skills
  • Experience working in or supporting 24x7 SOC operations

Preferred:

  • Certifications: CISSP, CISM, GCIH, GCIA, or related
  • Experience with SOAR platforms and automated playbooks
  • Exposure to threat intelligence, malware analysis, or reverse engineering
  • Knowledge of DevSecOps practices and CI/CD integration
  • Familiarity with regulatory frameworks (HIPAA, ISO, NIST, PCI)

Experience mentoring or leading SOC team initiatives.

Benefits

We believe in taking care of our team, which is why we offer a comprehensive benefits package that supports your health, wellness, and future:

  • Medical: 4 United Healthcare medical plans (including an HSA option)
  • Dental: 3 dental plans (Aetna and MetLife)
  • Vision: 2 Aetna vision plans
  • Wellness & Mental Health: 5 additional Medical Plus benefits, including telehealth support and an annual Talkspace subscription
  • Ancillary Coverage: 4 ancillary plans and supplemental life insurance
  • Retirement: 401(k) with a 4% match (after a 90-day exclusionary period)
  • PTO & Flexibility: Generous PTO and remote work support
  • Growth: Learning stipends and opportunities for professional development

Apply now

Subscribe our newsletter

New Things Will Always Update Regularly