×
Register Here to Apply for Jobs or Post Jobs. X

Senior Security Analyst

Job in Town of Poland, Jamestown, Chautauqua County, New York, 14701, USA
Listing for: Prophet Security
Full Time position
Listed on 2026-01-11
Job specializations:
  • IT/Tech
    Cybersecurity, IT Consultant
Job Description & How to Apply Below
Location: Town of Poland

Who We Are

Prophet Security is transforming cybersecurity operations with AI that works at machine speed. Our platform accelerates detection, investigation, and response, helping security teams stop attacks faster and operate smarter, without being limited by alerts or fragmented tools. As an early team, you’ll work alongside veterans from Abnormal Security, Expel, Mandiant, and McAfee, directly shaping the future of automated security and redefining what’s possible in defending organizations worldwide.

The Impact You'll Have

This is a role for builders who want to work at the bleeding edge of technology. This is the future of Security Operations: AI for scale, Humans for judgment.

As a Senior Analyst for Watchtower, you will step away from the "toil" of traditional SOC work. Our Agentic AI handles the repetitive heavy lifting—data gathering, initial triage, and correlation—optimizing your workflow so you only engage with high-stakes activity that requires senior-level nuance.

You will help shape the ethos, culture, and operational mindset of the Watchtower service. As a technical escalation point, you will not only validate malicious determinations and resolve inconclusive signals, but you will also set the standard for quality and precision for the team. You are the bridge between cutting-edge AI autonomy and expert human judgment, mentoring the next generation of analysts while focusing your own time on the threats that actually matter.

What You’ll Do
  • Build the Service:
    You aren't just following a process; you are helping build it. You will help define the playbooks, tone, and operational ethos that will drive our 24x7 service.

  • Set the Standard:
    Act as the technical lead for the watch, serving as the final escalation point for complex investigations. You will mentor new analysts, conduct quality reviews, and ensure the team meets a "Tier-3" standard of excellence.

  • Resolve the Complex:
    Validating confirmed malicious threats and investigating "Inconclusive" determinations where the AI lacks sufficient context. You are the expert decision-maker for the gray areas.

  • Uncover the Story:
    You don’t just look at artifacts; you reconstruct the full narrative of the attack. You piece together the "who, what, and why" to provide the specific context needed to guide precise remediation.

  • Train the AI:
    Actively participate in the operational feedback loop. Your validations, corrections, and insights will directly improve the AI’s detection logic, severity scoring, and decision quality.

  • Guide Remediation:
    Leveraging the story you’ve uncovered, you provide clear, human-guided remediation steps (approve, pause, or adjust) to help customers resolve threats with confidence.

  • Customer Communication:
    Provide expert narratives and clear next steps to customers during critical escalations, acting as a trusted extension of their SOC team.

What You’ll Bring
  • Experience operating in large enterprise, DFIR, or Managed Detection and Response environments

  • Proficiency investigating and responding to threats across endpoints, networks, SaaS apps, and cloud providers

  • Ability to think in workflows, not just alerts, and design investigations and responses that scale

  • Comfort writing code to support investigations or automation (Python, Go, or similar)

  • Response orchestration experience, such as designing playbooks or automating workflows, is a plus

  • Strong written and verbal communication skills with the ability to engage customers and peers

  • A quality-first mindset for investigations

  • Curiosity and attention to detail

What We’re Looking For
  • A Builder’s Mindset:
    You are excited by the prospect of building a service from the ground up. You want to use the latest AI technology to fundamentally change how security operations are done.

  • Senior Operational

    Experience:

    Minimum 3-5 years of hands-on experience in a SOC, MDR, MSSP, or Incident Response role.

  • Tier-3 Expertise:
    You have moved past "following the playbook" and know how to write or improve it. You know what real malicious activity looks like and can distinguish it from benign anomalies quickly.

  • Investigative Mindset:
    You understand the "why" and "how" of an attack. You are comfortable pivoting through…

Position Requirements
10+ Years work experience
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary