Get Hired Faster With COMPANY_NAME!
Don't you ever think you landed here by any accident, You are here because you are searching for something bigger. You know what?
- A better Job
- A better Future
- A better Knowledge
- A better Paycheck
- A greater Path to walk on.
And COMPANY_NAME is here to give you exactly what you've been missing for so long. The reality is that most job seekers chase job postings, but successful job seekers attract job offers by chasing the accurate information. Therefore, that's the shift COMPANY_NAME is going to help you make. Here are the top 10 ideas to up-skill yourself, so lean in to begin:
1: COMPANY_NAME Smart Tools and Direct Employer Connections Help Speed Up Your Hiring Process
COMPANY_NAME is a career-changing advantage that most seekers never get access to. Imagine...
- Instead of applying for job after job and still not getting any callbacks, you suddenly bump into a tool that can do the heavy lifting for you.
- Instead of wondering, "What do employers actually want?", you are getting insights straight from the employer's desk.
- Instead of hoping your resume gets noticed, it’s kept on the table of decision-makers who are hiring right now.
That's the difference COMPANY_NAME makes. Our tools will let you reach employers directly, which automatically speeds up your hiring process.
2: With Better Matches, Real-time Job Alerts, and Direct Employer Responses, COMPANY_NAME Helps Many Candidates Secure Interviews and Job Offers Within 15 to 30 Days!
How does COMPANY_NAME make this possible?
On COMPANY_NAME, you get notified for roles aligned with your profile right from the start. When an employer posts a role that matches your qualifications and skills, you’ll know first. When you apply early, your chances of getting noticed and shortlisted increase by 20%.
COMPANY_NAME also offers direct employer responses—no more waiting for weeks. Here you engage with hiring managers who are actively looking for candidates.
When all these features combine in one place, you move from your first match to your first interview within days. And ultimately, from application to offer—all within 15 to 30 days!
3: The Type of Resume You Need to Get Priority Placement
With COMPANY_NAME, you don’t just need a resume—you need a strategy. A system that pushes your name to the right tables. We’ll show you exactly how the most successful candidates take initiative and get noticed.
4: Browse Full-Time, Part-Time, and Freelancing Roles With COMPANY_NAME
The job market isn’t one-size-fits-all—and your career shouldn’t be either. COMPANY_NAME gives you access to a wide range of opportunities including full-time, part-time, and freelancing roles all in one place.
5: COMPANY_NAME Helps You Grow Your Career
COMPANY_NAME provides insights, tools, and role-matching that help you find the right direction, the right skills, and the opportunities aligned with your ambition.
6: The Easiest Way To Find A Job
COMPANY_NAME cuts the noise, the endless scrolling, and the confusion. With accurate matches, direct employer connection, and real-time updates, you get a clear and simple path from application to interview.
7: Find Roles That Offer Growth, Culture & Benefits
COMPANY_NAME helps you find roles where you grow, feel supported, and thrive—not just survive. With us, you discover opportunities that elevate your professional life.
8: Get Support With Resume, Interviews & Career Planning
COMPANY_NAME provides expert guidance on resumes, interviews, and planning so employers instantly recognize your strengths and value.
9: Your Future Starts Today
COMPANY_NAME gives you everything you need—tools, guidance, and opportunities—to step forward confidently and begin a new chapter where your potential is seen and supported.
10: Get Hired Within 15 to 30 Days With COMPANY_NAME
COMPANY_NAME follows a smart, strategic, and proven approach that gets your profile noticed faster and moves you toward interviews and offers within 15 to 30 days.
Cybersecurity Analyst (Remote)
Company Summary: TENEX.AI is an AI-native, automation-first, built-for-scale Managed Detection and Response (MDR) provider. We are a force multiplier for defenders, helping organizations enhance their cybersecurity posture through advanced threat detection, rapid response, and continuous protection. Our team is comprised of industry experts with deep experience in cybersecurity, automation, and AI-driven solutions. We’re a fast growing startup backed by industry experts and top tier investor Andreessen Horowitz. As an early employee, you’ll play a meaningful role in defining and building our culture. Get in on the ground floor. We’re a small but well-funded team that just raised a substantial round – joining now comes with limited risk and unlimited upside. We are rapidly growing and seeking top talent to join our mission of revolutionizing the cybersecurity landscape.
Job Summary: We are seeking a highly skilled and proactive Cybersecurity Analyst to join our Security Operations Center (SOC) team. The ideal candidate will have a strong background in cybersecurity, coupled with experience in leveraging AI and machine learning (ML) technologies, particularly in the context of Google’s SecOps platform (e.g. Google Chronicle), to enhance the detection, analysis, and response to security incidents. This role is integral to safeguarding digital infrastructure, ensuring rapid detection of threats, and supporting continuous improvement of security processes.
Culture is one of the most important things at TENEX.AI—check out our culture deck at culture.tenex.ai to experience how we champion it, valuing the unmatched collaboration and community of in-person work while offering flexibility for the best of the best.
This role is for the extraordinary—the pinnacle 10x of 10x legends in any role— where we make exceptions to our in-person hiring to champion full remote freedom, empowering you to conquer without boundaries while still inviting you to join our in-person energy from time to time.
To be direct up front - If you’re looking at this position, we strongly recommend you consider accepting one of our lucrative relocation packages to our epic hubs in Sarasota, Florida (outside Tampa), or Overland Park in the Kansas City metro—where trailblazers redefine cybersecurity with 10x impact!
In Florida, you can break free from overly inflated cost of living sky-high taxes (like those of you trapped in California or New York) via our incredibly aggressive relocation packages, enjoying zero state income tax, boundless personal freedom, a pro-business surge, endless sunshine, and a pro-family haven in the master-planned Lakewood Ranch with elite amenities and vibes. In KC, leverage those same powerhouse relocation perks for lower taxes, authentic Midwest values of integrity and community, and a supportive, family-oriented ecosystem for enduring wins. See those respective listings with more details on our careers page.
For candidates who embody the rare "10x of 10x" talent, we offer the flexibility of fully remote work. If you are an exceptional, unrivaled force in this role and prefer not to relocate at this time, we encourage you to apply for this remote-first position. Please be aware that the competition for these remote roles is exceptionally fierce, and the standards for selection are significantly higher.
Key Responsibilities:
-
Threat Monitoring & Detection:
Monitor security alerts and events across the enterprise network, using both traditional cybersecurity tools and AI/ML-powered threat detection systems.
Perform triage, investigation, and correlation of security events to determine the severity and impact of potential threats.
Leverage Google Chronicle's capabilities for threat intelligence and log analysis, enhancing visibility and providing insights into potential security incidents.
Apply AI to identify patterns, anomalies, and behaviors indicative of potential security incidents, reducing false positives and improving detection accuracy.
Participate in on-call rotations for critical security incidents as needed.
-
Incident Response & Analysis:
Investigate and analyze security incidents and breaches, leveraging AI to automate initial analysis and enhance threat hunting efforts.
Respond to security incidents following established procedures, including containment, eradication, and recovery actions.
Conduct root cause analysis and forensic investigations to understand attack vectors and recommend mitigation strategies.
Utilize Google SecOps and Chronicle’s advanced tools to centralize security data, correlate events, and accelerate incident response workflows.
Apply machine learning algorithms to identify emerging threats and trends, providing actionable insights for incident response.
-
Google SecOps & Chronicle Integration:
Work with Google SecOps platform tools to streamline security operations, improve threat visibility, and automate workflows.
Collaborate with IT, Security, and Data Science teams to integrate Google Chronicle’s capabilities into the SOC, enhancing threat detection and incident resolution.
Optimize Google Chronicle for log management, threat hunting, and advanced analytics.
-
Security Automation:
Develop and maintain automated workflows for common security incidents, leveraging AI for intelligent decision-making and faster response times.
Automate routine SOC tasks such as log analysis, incident classification, and threat intelligence enrichment using Google SecOps and Chronicle integrations.
-
Reporting & Documentation:
Create detailed reports on incidents and threat intelligence summaries integrating AI-driven findings and insights.
Prepare regular performance and security posture reports for internal stakeholders, highlighting key AI-driven improvements and threat mitigation outcomes.
Generate and present reports on threat trends, and SOC operations for internal stakeholders and customers.
Provide recommendations for security improvements and contribute to SOC playbook development.
-
Collaboration & Knowledge Sharing:
Work closely with cross-functional teams (e.g., IT, Customer Success, Engineering) to promote and improve AI-driven security initiatives and improve the customers' overall security posture.
Qualifications:
Education: Bachelor’s degree in Computer Science, Information Security, or a related field, or equivalent work experience. Relevant certifications (e.g., CISSP, CISM, CEH) are a plus.
-
Experience:
1+ years of experience in a Security Operations Center (SOC) or a similar security-focused role.
Hands-on experience with security analytics, log management, threat hunting, and incident response.
Interest in applying automation and/or artificial intelligence and machine learning techniques to cybersecurity tasks, such as threat detection, anomaly detection, and security automation.
-
Technical Skills:
Strong understanding of cybersecurity concepts and frameworks (e.g., NIST, Mitre, ISO, Killl Chain).
Experience with tools for cybersecurity, such as intrusion detection systems (IDS), SIEM tools, and security automation platforms.
Knowledge of security technologies such as firewalls, endpoint protection, IDS/IPS, and threat intelligence platforms.
-
Soft Skills:
Strong analytical and problem-solving skills.
Excellent communication skills for interacting with internal teams and external customers.
Ability to work under pressure in a fast-paced, dynamic environment.
Preferred Skills:
Experience with security orchestration, automation, and response (SOAR) platforms.
Exposure to cloud security platforms (e.g., AWS, Azure, Google Cloud) and the associated risks.
Practical experience working with Google SecOps tools and Chronicle for centralized threat intelligence and event correlation a plus.
Hands-on experience with the Microsoft security platform (Sentinel, Defender) is a plus.
Why Join Us?
Opportunity to work with cutting-edge AI-driven cybersecurity technologies and Google SecOps solutions.
Collaborate with a talented and innovative team focused on continuously improving security operations.
Competitive salary and benefits package.
A culture of growth and development, with opportunities to expand your knowledge in AI, cybersecurity, and emerging technologies.
If you're passionate about combining cybersecurity expertise with artificial intelligence and have experience with Google SecOps and Chronicle, we encourage you to apply!