×
Register Here to Apply for Jobs or Post Jobs. X
More jobs:

IT Security Operations Specialist

Job in Durham, Durham County, North Carolina, 27703, USA
Listing for: FUJIFILM
Full Time position
Listed on 2026-03-06
Job specializations:
  • IT/Tech
    Cybersecurity
Salary/Wage Range or Industry Benchmark: 80000 - 100000 USD Yearly USD 80000.00 100000.00 YEAR
Job Description & How to Apply Below

Position Overview

Join us as an IT Security Operations Specialist and help safeguard a global, mission-driven organization. This hybrid analyst–engineer role sits at the heart of our Security Operations, combining hands-on threat monitoring, decisive incident response, and light administration of core security platforms to keep our environment resilient and secure.

Company Overview

The work we do at FUJIFILM Biotechnologies has never been more important—and we are looking for talented candidates to join us. We are growing our locations, our capabilities, and our teams, and looking for passionate, mission-driven people like you who want to make a real difference in people’s lives. Join FUJIFILM Biotechnologies and help make the next vaccine, cure, or gene therapy in partnership with some of the most innovative biopharma companies across the globe.

We are proud to cultivate a culture that will fuel your passion, energy, and drive - what we call Genki.

Fujifilm is globally headquartered in Tokyo with over 70,000 employees across four key business segments of healthcare, electronics, business innovation, and imaging. We are guided and united by our Group Purpose of “giving our world more smiles.” Visit:

Job Description Why you’ll love this role
  • Make an immediate impact:
    Stop threats fast, contain incidents, and strengthen our defenses across the enterprise.
  • Work with modern tooling:
    Operate and tune Crowd Strike Falcon and Netskope, using Splunk to investigate and analyze events at scale.
  • Keep learning:
    Apply MITRE ATT&CK, ingest new IOCs/TTPs, and automate repetitive tasks to continually improve operations.
  • Collaborate broadly:
    Partner with Endpoint, Network, IAM, Infrastructure, and Application teams—and interface with vendors—on real-world remediation.
What you’ll do
  • Continuously monitor EDR/XDR alerts (primarily Crowd Strike Falcon), triage events, validate true/false positives, and elevate per playbooks and SLAs.
  • Execute incident response activities: containment, eradication, recovery, evidence handling, root cause analysis, documentation, and lessons learned.
  • Perform light Crowd Strike administration: sensor health/coverage, minor policy updates (prevention, firewall, device control), tuning detections, and basic RTR workflows under change control.
  • Investigate using Splunk, Crowd Strike, and Netskope: query logs/telemetry, pivot on IOCs/TTPs, correlate events, and create ad hoc searches to support IR.
  • Review Netskope alerts/events and make minor policy adjustments (e.g., category/exception tuning) per standards and CAB approvals.
  • Coordinate remediation with Infrastructure, Endpoint, Network, IAM, and Application teams; validate fixes and track to closure.
  • Produce operational and executive-ready reporting, trends, and metrics; support audit and compliance requests.
  • Maintain runbooks, SOPs, and knowledge base content to drive consistency and speed onboarding.
  • Intake threat intelligence and manage IOCs to enhance detections; align improvements to MITRE ATT&CK.
  • Automate repetitive tasks with Power Shell/Python/JSON following coding standards and change management.
Minimum qualification requirements
  • Bachelor’s degree in Information Security, Computer Science, Information Technology, or related discipline preferred; equivalent experience may be considered.
  • 5+ years of IT or cybersecurity experience, including at least 3 years in Security Operations (monitoring, triage, incident response).
  • Hands-on operational experience with Crowd Strike Falcon in an enterprise environment (required).
  • Experience using Splunk or another SIEM for investigations (searching, pivoting, dashboarding).
  • Familiarity with IOC/TTP analysis, MITRE ATT&CK, endpoint OS artifacts, and core network protocols (TCP/IP, DNS, HTTP/S, VPN, proxies).
  • Basic scripting/automation ability (Power Shell, Python, JSON).
  • Strong analytical, problem-solving, communication, and documentation skills.
Preferred qualifications
  • Certifications:

    Crowd Strike CCFA/CCFR/CCFH, CompTIA Security+/CySA+, GIAC (e.g., GCIA, GCFA, GCIH).
  • Experience with Netskope (SWG, CASB, ZTNA, DLP) for alert triage and minor policy adjustments.
  • Experience tuning EDR/secure web gateway policies and…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary