Senior Security Analyst
Listed on 2025-12-18
-
IT/Tech
Cybersecurity, Security Manager
Neptune Technology Group Inc. is a technology company serving water utilities across North America. Since 1892, we have continually focused on the evolving needs of water utilities – revenue optimization, operational efficiencies, and improved customer service. With our portfolio of smart water meters, data collection systems and software, we make data actionable for our customers – so they can remain focused on the business of water.
For additional information, please visit the company website at .
As a Senior Security Analyst, you will be a key member of Neptune’s 24×7 Security Operations program, supporting incident response, SIEM management, and threat detection across a hybrid environment (on-prem, cloud, SaaS). You’ll work closely with the SOC Manager to execute detection, response, and reporting processes that protect Neptune and meet compliance requirements.
Responsibilities:- Monitor and analyze security alerts from SIEM and EDR platforms
- Investigate anomalies and suspicious activity across endpoints, networks, and cloud environments
- Maintain high-fidelity alerting and reduce false positives through tuning
- Execute playbooks for triage, containment, and remediation of security incidents
- Assist in forensic investigations and contribute to post-mortem reports
- Participate in tabletop exercises and readiness drills
- Maintain SIEM health and ensure reliable telemetry across all assets
- Develop and refine detection rules and correlation logic
- Support automation and orchestration workflows for incident handling
- Monitor identity‑related events for anomalies and privilege escalation attempts
- Support IAM lifecycle processes and enforce least privilege principles
- Integrate threat intelligence feeds into detection workflows
- Assist in threat modeling to identify potential attack paths
- Document incidents and provide timely updates to SOC Manager for reporting to parent company
- Track and report operational metrics (MTTD, MTTR, alert volumes, etc.)
- Apply secure‑by‑design principles in collaboration with engineering teams
- Support zero trust initiatives and network segmentation projects
- SIEM/Sec Ops: e.g. Google Sec Ops (Chronicle)
- EDR & Identity: e.g. Crowd Strike, Microsoft AD/Entra
- Network Security: e.g. Forti Gate NGFW, FortiSASE
- Secure Browsing: e.g. Prisma
- Patching & Config: e.g. Automox
- Secrets Management: e.g. Keeper
- Email & Data Security: e.g. Mimecast, Microsoft Purview
- 3+ years in Security Operations or Incident Response
- Hands‑on experience with SIEM, EDR, and threat detection
- Familiarity with NIST, ISO, MITRE ATT&CK, and zero trust principles
- Strong analytical and communication skills
- Security certifications (e.g., GCIH, GCIA, CISSP)
- Experience with cloud security (AWS, Azure, GCP)
- Exposure to SOAR automation and scripting
- Travel Requirements:
Typically requires overnight travel less than 10% of the time.
Typically requires overnight travel less than 10% of the time.
Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities
This employer is required to notify all applicants of their rights pursuant to federal employment laws. For further information, please review the Know Your Rights notice from the Department of Labor.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).