Stuller, Inc. · 2 days ago
Senior Information Security Analyst
Stuller, Inc. is the jewelry industry's largest manufacturer, supplier, and technology developer in North America. They are seeking a Senior Information Security Analyst to conduct advanced threat detection and incident response, ensuring the security of their operations and customer data. This role involves collaborating with teams, mentoring junior analysts, and influencing security strategy within the organization.
Responsibilities
Security Monitoring, Detection & Incident Response: Serve as the technical authority validating recommendations from MDR and IR providers. Analyze security events across EDR/XDR platforms, network devices, and cloud services to distinguish true threats from false positives. Approve containment actions, make rapid decisions during incidents, and coordinate with stakeholders. Provide feedback to improve detection quality and document incident details for compliance
Threat Hunting & Proactive Defense: Use threat intelligence, automation, and continuous monitoring to proactively hunt threats. Leverage security tools for detection and investigation, streamline response workflows, and analyze vulnerability scans. Support penetration testing, translate threat advisories into IT initiatives, and oversee implementation of security engineering changes such as rule updates, identity controls, network segmentation, and logging improvements
Governance, Compliance & Continuous Improvement: Maintain and update incident response runbooks, security policies, and procedures to align with best practices and regulatory requirements (NIST CSF, PCI-DSS). Support audits by providing evidence of security controls and documentation. Monitor security tool health, escalate issues, and assist with configuration and integration
Metrics, Reporting & Strategic Insight: Analyze incident data and trends to identify attack patterns and areas for improvement. Prepare technical reports and metrics for leadership, highlighting investigation findings and SOC performance. Use insights to recommend enhancements to detection and response capabilities and contribute to regular security posture reporting
Collaboration, Mentorship & Knowledge Sharing: Guide junior analysts in complex investigations and analysis techniques. Share expertise on security tools and methodologies through mentorship and documentation. Help develop incident response playbooks and SOC best practices, and participate in tabletop exercises and incident response drills to maintain readiness
Qualification
Required
Bachelor's in Computer Science, Cybersecurity, Information Systems, or related field; or equivalent with 7+ years relevant experience
Minimum 5 years in information security, including 3-4 years in a SOC or security analyst role
Experience in SOC environments handling security monitoring, alert triage, and incident investigations
Skilled in the incident response lifecycle and using MITRE ATT&CK for threat classification
Proficient with SIEM platforms (Splunk, Microsoft Sentinel, IBM QRadar, or similar), creating search queries, and analyzing alerts from EDR/XDR, network, and cloud security tools
Ability to identify attack patterns (phishing, malware, unauthorized access, data exfiltration, insider threats) and correlate data from network logs, endpoints, and threat intelligence
Solid understanding of vulnerabilities and exploitation techniques
Experience analyzing logs from Windows, Linux, network devices, cloud platforms (AWS, Azure, GCP), and performing basic forensic analysis
Familiarity with NIST CSF, MITRE ATT&CK, and PCI-DSS compliance
Knowledge of audit processes and evidence collection
Strong analytical thinking, attention to detail, and clear written/verbal communication for technical documentation and incident coordination
Collaborative in SOC environments, sharing knowledge, and maintaining confidentiality and ethical standards
Working knowledge of cloud security principles and major platforms (AWS, Azure, GCP)
Willingness for after-hours or weekend coverage as needed
Preferred
Master's in Cybersecurity, Information Assurance, Computer Science, Digital Forensics, or related discipline
Certifications such as CISSP, GCIH, GCIA, OSCP, CEH, or equivalent
Advanced SIEM rule development, custom queries (SPL, KQL), experience with TIPs, SOAR, workflow automation, digital forensics tools, network traffic analysis, malware analysis, container security (Docker, Kubernetes), and scripting (Python, PowerShell, Bash)
Experience developing detection content for MITRE ATT&CK, red/blue team exercises, penetration testing (Kali Linux, Metasploit, Burp Suite), exploit development, vulnerability research, and threat hunting (ELK Stack, Jupyter notebooks)
Direct involvement in PCI-DSS, ISO 27001, HIPAA, SOC 2 compliance
Experience as a subject matter expert, contributing to playbook development, delivering technical training, and active participation in the security community (CTF, conferences, bug bounty, open-source)
Benefits
Comprehensive health and happiness
Award-winning wellness initiatives
Company
Stuller, Inc.
Stuller, Inc.provide a range of products and services for jewelry professionals including design technology.
H1B Sponsorship
Stuller, Inc. has a track record of offering H1B sponsorships. Please note that this does not
guarantee sponsorship for this specific role. Below presents additional info for your
reference. (Data Powered by US Department of Labor)
Distribution of Different Job Fields Receiving Sponsorship
Represents job field similar to this job
Trends of Total Sponsorships
2025 (6)
2024 (5)
2023 (4)
2022 (2)
2021 (3)
2020 (2)
Funding
Current Stage
Late StageRecent News
Company data provided by crunchbase