IT Security Operations Specialist

FujifilmMorrisville, NC
1dHybrid

About The Position

Join us as an IT Security Operations Specialist and help safeguard a global, mission-driven organization. This hybrid analyst–engineer role sits at the heart of our Security Operations, combining hands-on threat monitoring, decisive incident response, and light administration of core security platforms to keep our environment resilient and secure. Company Overview The work we do at FUJIFILM Biotechnologies has never been more important—and we are looking for talented candidates to join us. We are growing our locations, our capabilities, and our teams, and looking for passionate, mission-driven people like you who want to make a real difference in people’s lives. Join FUJIFILM Biotechnologies and help make the next vaccine, cure, or gene therapy in partnership with some of the most innovative biopharma companies across the globe. We are proud to cultivate a culture that will fuel your passion, energy, and drive - what we call Genki. Fujifilm is globally headquartered in Tokyo with over 70,000 employees across four key business segments of healthcare, electronics, business innovation, and imaging. We are guided and united by our Group Purpose of “giving our world more smiles.” Visit: https://www.fujifilm.com/us/en/about/region/careers Job Description Why you’ll love this role Make an immediate impact: Stop threats fast, contain incidents, and strengthen our defenses across the enterprise. Work with modern tooling: Operate and tune CrowdStrike Falcon and Netskope, using Splunk to investigate and analyze events at scale. Keep learning: Apply MITRE ATT&CK, ingest new IOCs/TTPs, and automate repetitive tasks to continually improve operations. Collaborate broadly: Partner with Endpoint, Network, IAM, Infrastructure, and Application teams—and interface with vendors—on real-world remediation.

Requirements

  • Bachelor’s degree in Information Security, Computer Science, Information Technology, or related discipline preferred; equivalent experience may be considered.
  • 5+ years of IT or cybersecurity experience, including at least 3 years in Security Operations (monitoring, triage, incident response).
  • Hands-on operational experience with CrowdStrike Falcon in an enterprise environment (required).
  • Experience using Splunk or another SIEM for investigations (searching, pivoting, dashboarding).
  • Familiarity with IOC/TTP analysis, MITRE ATT&CK, endpoint OS artifacts, and core network protocols (TCP/IP, DNS, HTTP/S, VPN, proxies).
  • Basic scripting/automation ability (PowerShell, Python, JSON).
  • Strong analytical, problem-solving, communication, and documentation skills.

Nice To Haves

  • Certifications: CrowdStrike CCFA/CCFR/CCFH, CompTIA Security+/CySA+, GIAC (e.g., GCIA, GCFA, GCIH).
  • Experience with Netskope (SWG, CASB, ZTNA, DLP) for alert triage and minor policy adjustments.
  • Experience tuning EDR/secure web gateway policies and collaborating within established change controls.
  • Demonstrated ability to create clear SOPs/runbooks and executive-ready operational metrics.

Responsibilities

  • Continuously monitor EDR/XDR alerts (primarily CrowdStrike Falcon), triage events, validate true/false positives, and escalate per playbooks and SLAs.
  • Execute incident response activities: containment, eradication, recovery, evidence handling, root cause analysis, documentation, and lessons learned.
  • Perform light CrowdStrike administration: sensor health/coverage, minor policy updates (prevention, firewall, device control), tuning detections, and basic RTR workflows under change control.
  • Investigate using Splunk, CrowdStrike, and Netskope: query logs/telemetry, pivot on IOCs/TTPs, correlate events, and create ad hoc searches to support IR.
  • Review Netskope alerts/events and make minor policy adjustments (e.g., category/exception tuning) per standards and CAB approvals.
  • Coordinate remediation with Infrastructure, Endpoint, Network, IAM, and Application teams; validate fixes and track to closure.
  • Produce operational and executive-ready reporting, trends, and metrics; support audit and compliance requests.
  • Maintain runbooks, SOPs, and knowledge base content to drive consistency and speed onboarding.
  • Intake threat intelligence and manage IOCs to enhance detections; align improvements to MITRE ATT&CK.
  • Automate repetitive tasks with PowerShell/Python/JSON following coding standards and change management.

Benefits

  • Our programs are designed to focus on maintaining and enhancing all pillars of health with a robust benefits package including medical, dental, vision and prescription drug coverage with the option of a Health Savings Account with company contributions.
  • In addition, we offer an industry leading 401(k) savings plan, insurance coverage, employee assistance programs and various wellness incentives.
  • We support life-work balance with paid vacation time, sick time, and company holidays.
  • Explore a supportive environment that enriches both your personal and professional growth!
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service