Claroty

Claroty has redefined cyber-physical systems (CPS) protection with an unrivaled industry-centric platform built to secure mission-critical infrastructure. The Claroty Platform provides the deepest asset visibility and the broadest, built-for-CPS solution set in the market comprising exposure management, network protection, secure access, and threat detection – on-premise with Claroty Continuous Threat Detection (CTD) or in the cloud with Claroty xDome. Backed by award-winning threat research and a breadth of technology alliances. Claroty is deployed by hundreds of organizations at thousands of sites globally. Headquartered in New York City with U.S. Federal headquarters in Northern Virginia. A Great Place to Work® certified company. Recognized as the industry leader in CPS protection. Ranked on the Forbes Cloud 100 and Deloitte Technology Fast 500 for multiple consecutive years.

Security Operations Engineer

Security OperationsSecurity OperationsFull TimeRemoteTeam 350Since 2015Company Site

Location

United States

Posted

15 days ago

Salary

Not specified

No structured requirement data.

Job Description

This description is a summary of our understanding of the job description. Click on 'Apply' button to find out more.

Role Description

We are seeking a detail-oriented FedRAMP Security Operations Engineer to support our organization's adherence to the Federal Risk and Authorization Management Program (FedRAMP) requirements. In this role, you will be the primary engineer and operator of our security monitoring stack within a FedRAMP-authorized environment.

  • Ownership of our Splunk and Trend Micro environments.
  • Maintain standards across all daily SecOps and JIRA ticketing.
  • Assist with Entra ID related tasks (user access, SSO integrations, etc).
  • Architect high-fidelity logging by managing Splunk data models and CIM mapping to ensure deep root-cause analysis.
  • Leverage scripting to automate routine tasks, allowing the team to pivot quickly from audits to active investigations.
  • Bridge the gap between technical complexity and business needs by explaining critical issues to non-technical stakeholders.
  • Support the expansion of our Public Sector practice by securing mission-critical systems and protecting national infrastructure.

Qualifications

  • Minimum of 2+ years of Splunk Administration experience: comfortable managing data models and CIM mapping.
  • Hands-on experience with Trend Micro Deep Security or Cloud One Workload Security, specifically in auto-scaling cloud environments.
  • Strong proficiency in AWS (GuardDuty, CloudTrail, Config).
  • Ability to automate tasks using Python, Bash, or PowerShell to reduce "manual toil" in the SOC recommended.
  • Hands-on experience with IDP (Entra ID) and managing user access and group policies. SAML/SSO federation and implementation experience.
  • U.S. Citizenship (required for working in GovCloud environments).

Requirements

  • Experience in a FedRAMP Moderate or High environment preferred.
  • Splunk Power User or Admin certification preferred.

Benefits

  • Expected compensation for the role is between $160,000 - $190,000.
  • This is a good faith estimate but does not include equity, bonus, or other forms of payment.
  • Pay will be determined by experience level, but those outside the salary band are welcome to apply.

Company Description

Claroty has redefined cyber-physical systems (CPS) protection with an unrivaled industry-centric platform built to secure mission-critical infrastructure. The Claroty Platform provides the deepest asset visibility and the broadest, built-for-CPS solution set in the market comprising exposure management, network protection, secure access, and threat detection – on-premise with Claroty Continuous Threat Detection (CTD) or in the cloud with Claroty xDome.

  • Backed by award-winning threat research and a breadth of technology alliances.
  • Claroty is deployed by hundreds of organizations at thousands of sites globally.
  • Headquartered in New York City with U.S. Federal headquarters in Northern Virginia.
  • A Great Place to Work® certified company.
  • Recognized as the industry leader in CPS protection.
  • Ranked on the Forbes Cloud 100 and Deloitte Technology Fast 500 for multiple consecutive years.

Job Requirements

  • Minimum of 2+ years of Splunk Administration experience: comfortable managing data models and CIM mapping.
  • Hands-on experience with Trend Micro Deep Security or Cloud One Workload Security, specifically in auto-scaling cloud environments.
  • Strong proficiency in AWS (GuardDuty, CloudTrail, Config).
  • Ability to automate tasks using Python, Bash, or PowerShell to reduce "manual toil" in the SOC recommended.
  • Hands-on experience with IDP (Entra ID) and managing user access and group policies. SAML/SSO federation and implementation experience.
  • U.S. Citizenship (required for working in GovCloud environments).
  • Experience in a FedRAMP Moderate or High environment preferred.
  • Splunk Power User or Admin certification preferred.

Benefits

  • Expected compensation for the role is between $160,000 - $190,000.
  • This is a good faith estimate but does not include equity, bonus, or other forms of payment.
  • Pay will be determined by experience level, but those outside the salary band are welcome to apply.

Related Categories

Related Job Pages

More Security Operations Jobs

Senior Security Operations Engineer

Included Health

Dedicated to offering “all included” healthcare for people everywhere, Included Health offers high-quality, customized medical expertise, virtually or in pe

Security Operations17 days ago
Full TimeRemote

Senior Security Operations Engineer improving DLP protections at Included Health

AWSCloudPythonSplunkSQL
United States
$138.4K - $254.1K / year

Engineer III - Cyber Incident Response

Cencora

Cencora is a leading pharmaceutical solutions organization centered on improving the lives of people and animals everywhere. With 46,000+ global team members, we have the opportunity to make a positive impact on healthcare in communities everywhere. Our team members are empowered to activate their careers through a collective of tools and resources designed to support individual career interests and aspirations. We value our listening culture that actions real outcomes and our team members appreciate and recognize one another for contributions that are making a meaningful global impact. No matter what your role is here, the work we do together has meaning. When you join our team, you become a crucial part of a greater purpose. We’re committed to supporting you personally and professionally, so we can achieve more together at the center of health. Protect yourself from job scams: Recruitment scams are on the rise. To protect yourself, we urge you to be vigilant and follow these guidelines > https://careers.cencora.com/us/en/job-scams

Security Operations18 days ago
Full TimeRemoteTeam 51,000Since 2023

The Engineer III leads complex cyber incident investigations, enhances response capabilities, mentors junior analysts, and collaborates with global defense teams.

CrowdstrikeCybersecurityDigital ForensicsEdrEncaseIncident ResponseIso 27035Mitre Att&CkNistSIEMSoarSplunkWireshark
Pennsylvania

Senior Manager, Security Incident Response Team

GitLab

Build software faster. The One DevOps Platform enables your entire org to collaborate around your code. We're hiring.

Security Operations18 days ago
Full TimeRemoteTeam 1,001-5,000Since 2014H1B No Sponsor

Senior Manager leading GitLab's security incident response team in the Americas

AWSCloudCyber SecurityGoogle Cloud PlatformSplunk
California
$168K - $280K / year

Senior Cybersecurity Operations Consultant

Trility Consulting

Start delivering technology solutions that simplify, automate, and secure your business.

Security Operations19 days ago
ContractRemoteTeam 51-200H1B No Sponsor

Senior Cybersecurity Operations Engineer at Trility transitioning to new MSSP

CloudCyber Security
United States