×
Register Here to Apply for Jobs or Post Jobs. X

IT Security Analyst II; Remote

Remote / Online - Candidates ideally in
McKinney, Collin County, Texas, 75069, USA
Listing for: Globe Life
Remote/Work from Home position
Listed on 2026-01-16
Job specializations:
  • IT/Tech
    Cybersecurity, Security Manager
Job Description & How to Apply Below
Position: IT Security Analyst II (Remote)

IT Security Analyst II (Remote)

Could you be our next IT Security Analyst II
? Globe Life is looking for an IT Security Analyst II to join the team!

At Globe Life, we are committed to empowering our employees with the support and opportunities they need to succeed at every stage of their career. Our thriving and dynamic community offers ample room for professional development, increased earning potential, and a secure work environment.

We take pride in fostering a caring and innovative culture that enables us to collectively grow and overcome challenges in a connected, collaborative, and mutually respectful environment that calls us to help Make Tomorrow Better.

In this role, you will be responsible for safeguarding the organization’s systems and data by detecting, analyzing, and responding to security threats in real‑time. This role focuses on leveraging SIEM and EDR technologies to investigate suspicious activity, conduct proactive threat hunting, and support incident response efforts. The analyst plays a critical role in maintaining a strong security posture by identifying vulnerabilities, monitoring emerging threats, and collaborating with IT and business teams to implement effective security controls.

This is a remote / work‑from‑home position.

What You Will Do
  • Monitor and analyze security alerts and events from SIEM, EDR, and other security platforms to identify and triage potential threats.
  • Conduct proactive threat hunting across endpoint, network, and cloud environments to detect signs of compromise or malicious activity.
  • Investigate security incidents, determine root cause, assess impact, and assist with containment and remediation.
  • Collaborate with IT, engineering, and business teams to validate findings and implement corrective actions.
  • Develop and fine‑tune detection rules, threat indicators, and automated response workflows within SIEM and EDR platforms.
  • Maintain documentation for detection use cases, incident response procedures, and threat hunting playbooks.
  • Participate in continuous improvement initiatives to enhance monitoring capabilities, logging coverage, and alert fidelity.
  • Stay informed on emerging threats, vulnerabilities, and relevant tactics, techniques, and procedures (TTPs).
  • Provide coaching and mentoring to junior analysts to develop their technical and investigative skills.
  • Support broader security initiatives as needed, including red/purple team engagements, tabletop exercises, and post‑incident reviews.
What You Can Bring
  • Bachelor’s degree in Information Technology, Information Systems, or Information Assurance, or equivalent work experience.
  • Minimum of 5+ years of experience in IT Security, Identity and Access Management, or related skills required.
  • Certifications such as Security+, CySA+, GCIA, GCIH, or equivalent.
  • CISSP, CRISC, CISA, or CISM certification (Strongly Preferred).Familiarity with cloud security monitoring tools (e.g., AWS Guard Duty, Cloud Trail, Azure Defender).
  • Experience with security automation or scripting (e.g., Python, Power Shell).
  • Exposure to FAIR risk analysis or other quantitative/qualitative risk frameworks.
  • Prior experience in a SOC or threat detection environment.
  • Hands‑on experience with SIEM (e.g., Log Rhythm, Splunk, QRadar) and EDR platforms (e.g., Crowd Strike, Sentinel One).
  • Proficiency in detecting and responding to security incidents, including log analysis, endpoint investigations, and network threat identification.
  • Strong understanding of cyber threat TTPs and familiarity with frameworks such as MITRE ATT&CK.
  • Experience in threat hunting across endpoint, cloud, or hybrid environments.
  • Knowledge of key information security domains: access control, vulnerability management, incident response, and business continuity.
  • Working knowledge of security and privacy regulations/frameworks such as HIPAA, PCI‑DSS, and NYDFS.
  • Foundational understanding of ISO 27001/27002 and NIST Cybersecurity Framework (CSF); familiarity with NIST 800‑30 and 800‑39 is a plus.
  • Understanding of threat and vulnerability concepts, including CVEs, IOCs, IOAs, malware behavior, lateral movement, and persistence mechanisms.
  • Strong verbal and written communication skills with the ability…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary