IT Security Operations Specialist
Listed on 2026-03-06
-
IT/Tech
Cybersecurity
Position Overview
Join us as an IT Security Operations Specialist and help safeguard a global, mission-driven organization. This hybrid analyst–engineer role sits at the heart of our Security Operations, combining hands-on threat monitoring, decisive incident response, and light administration of core security platforms to keep our environment resilient and secure.
Company OverviewThe work we do at FUJIFILM Biotechnologies has never been more important—and we are looking for talented candidates to join us. We are growing our locations, our capabilities, and our teams, and looking for passionate, mission-driven people like you who want to make a real difference in people’s lives. Join FUJIFILM Biotechnologies and help make the next vaccine, cure, or gene therapy in partnership with some of the most innovative biopharma companies across the globe.
We are proud to cultivate a culture that will fuel your passion, energy, and drive - what we call Genki.
Fujifilm is globally headquartered in Tokyo with over 70,000 employees across four key business segments of healthcare, electronics, business innovation, and imaging. We are guided and united by our Group Purpose of “giving our world more smiles.” Visit:
- Make an immediate impact:
Stop threats fast, contain incidents, and strengthen our defenses across the enterprise. - Work with modern tooling:
Operate and tune Crowd Strike Falcon and Netskope, using Splunk to investigate and analyze events at scale. - Keep learning:
Apply MITRE ATT&CK, ingest new IOCs/TTPs, and automate repetitive tasks to continually improve operations. - Collaborate broadly:
Partner with Endpoint, Network, IAM, Infrastructure, and Application teams—and interface with vendors—on real-world remediation.
- Continuously monitor EDR/XDR alerts (primarily Crowd Strike Falcon), triage events, validate true/false positives, and elevate per playbooks and SLAs.
- Execute incident response activities: containment, eradication, recovery, evidence handling, root cause analysis, documentation, and lessons learned.
- Perform light Crowd Strike administration: sensor health/coverage, minor policy updates (prevention, firewall, device control), tuning detections, and basic RTR workflows under change control.
- Investigate using Splunk, Crowd Strike, and Netskope: query logs/telemetry, pivot on IOCs/TTPs, correlate events, and create ad hoc searches to support IR.
- Review Netskope alerts/events and make minor policy adjustments (e.g., category/exception tuning) per standards and CAB approvals.
- Coordinate remediation with Infrastructure, Endpoint, Network, IAM, and Application teams; validate fixes and track to closure.
- Produce operational and executive-ready reporting, trends, and metrics; support audit and compliance requests.
- Maintain runbooks, SOPs, and knowledge base content to drive consistency and speed onboarding.
- Intake threat intelligence and manage IOCs to enhance detections; align improvements to MITRE ATT&CK.
- Automate repetitive tasks with Power Shell/Python/JSON following coding standards and change management.
- Bachelor’s degree in Information Security, Computer Science, Information Technology, or related discipline preferred; equivalent experience may be considered.
- 5+ years of IT or cybersecurity experience, including at least 3 years in Security Operations (monitoring, triage, incident response).
- Hands-on operational experience with Crowd Strike Falcon in an enterprise environment (required).
- Experience using Splunk or another SIEM for investigations (searching, pivoting, dashboarding).
- Familiarity with IOC/TTP analysis, MITRE ATT&CK, endpoint OS artifacts, and core network protocols (TCP/IP, DNS, HTTP/S, VPN, proxies).
- Basic scripting/automation ability (Power Shell, Python, JSON).
- Strong analytical, problem-solving, communication, and documentation skills.
- Certifications:
Crowd Strike CCFA/CCFR/CCFH, CompTIA Security+/CySA+, GIAC (e.g., GCIA, GCFA, GCIH). - Experience with Netskope (SWG, CASB, ZTNA, DLP) for alert triage and minor policy adjustments.
- Experience tuning EDR/secure web gateway policies and…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).