Proofpoint

Security Solution Analyst II

Proofpoint

full-time

Posted on:

Location Type: Hybrid

Location: ConnecticutFloridaUnited States

Visit company website

Explore more

AI Apply
Apply

Salary

💰 $23 - $43 per hour

Tech Stack

About the role

  • Monitoring and improving AI agents, enforcing guardrails, adjudicating complex decisions
  • Training and mentoring of junior analysts
  • Oversee escalations from L1 analysts and customers, coordinate rapid response for high-severity incidents
  • Assisting with L1 triaged as needed
  • They will also be responsible for the building of and maintenance of escalation work flows and providing feedback on request.
  • Provide feedback recommendations to the Client Service Manager
  • Presentation of reports and advanced analytics findings when required
  • Attendance at all routine client meetings and prep-meetings for Proofpoint Clients
  • Overall Responsibility for any non-engineering client requests.
  • Assist in identifying opportunities for new alarms policies
  • Maintenance of runbooks/Proofpoint documentation (i.e. alarm workflows, escalation procedures, team details, client knowledge base)

Requirements

  • 2+ years in L2 supervision or incident command
  • Experience with automation/SOAR workflows and policy-based approvals for response actions.
  • Demonstrated ability to review and improve AI-driven detections or automated playbooks; comfort with explainability, guardrails, and risk-based decisions.
  • Familiarity with agentic AI concepts (tool-use policies, action confidence, multi-agent orchestration, reward signals) and RAG pipelines for security context.
  • Knowledge of Phishing technology and functions of some security tools that protect/prevent end users against them
  • Knowledge of SIEM technology and functions of some security tools
  • Experience working with interpreting, tuning, searching and manipulating data within SIEM
  • Experience working with interpreting, searching and understanding the backdown of the structure of an email
  • The ability to demonstrate understanding of what a phishing email is, how to spot on and what ramification could be to an end user/company if not stopped
  • Knowledge or experience utilizing the Cyber Kill Chain, Diamond Model or other appropriate models
  • Experience in gathering and managing threat intelligence
  • Ability to present a recommended remediation strategy to client in professional format
  • Basic knowledge of cyber security threats and the ability to explain the impact they have to a user/company.
Benefits
  • Competitive compensation
  • Comprehensive benefits
  • Career success on your terms
  • Flexible work environment
  • Annual wellness and community outreach days
  • Always on recognition for your contributions
  • Global collaboration and networking opportunities
Applicant Tracking System Keywords

Tip: use these terms in your resume and cover letter to boost ATS matches.

Hard Skills & Tools
AI agents monitoringautomation workflowsSOARAI-driven detectionsPhishing technologySIEM technologydata manipulationCyber Kill Chainthreat intelligence managementremediation strategy presentation
Soft Skills
mentoringescalation managementclient communicationfeedback provisionreport presentationincident response coordinationanalytical thinkingproblem-solvingteam collaborationorganizational skills