×
Register Here to Apply for Jobs or Post Jobs. X

Security Specialist

Remote / Online - Candidates ideally in
Carlsbad, San Diego County, California, 92002, USA
Listing for: Viasat
Full Time, Remote/Work from Home position
Listed on 2025-12-23
Job specializations:
  • IT/Tech
    Cybersecurity, Security Manager, Information Security, Network Security
Salary/Wage Range or Industry Benchmark: 105500 - 167500 USD Yearly USD 105500.00 167500.00 YEAR
Job Description & How to Apply Below

About us

One team. Global challenges. Infinite opportunities. At Viasat, we’re on a mission to deliver connections with the capacity to change the world. For more than 35 years, Viasat has helped shape how consumers, businesses, governments and militaries around the globe communicate. We’re looking for people who think big, act fearlessly, and create an inclusive environment that drives positive impact to join our team.

What

you’ll do

We are thrilled to announce an exciting opportunity for a Security Specialist to join our dynamic team in Carlsbad, CA! This hybrid role offers the unique blend of working collaboratively within our Carlsbad office and the flexibility of remote work.

The Security Specialist will form part of the global 24 x7 security team that monitors the network for suspicious activity and supports incident response activities. All of Viasat’s networks are covered by this group, including those supporting the US government, as well as commercial interests. This role combines portions of traditional Tier I/II/III SOC responsibilities to include alert triaging, detailed incident handling across online and on-premise infrastructure, following an incident response process to contain & mitigate security risks, and supporting threat hunting activities.

Your mission is to perform:

  • Security Monitoring: review alerts within SIEM/SOAR platforms and manage security cases & tickets, conduct initial security incident analysis to ensure timely response.
  • Incident Response: drive the entire incident response lifecycle from initial triage and in-depth investigation to rapid containment and effective remediation of active security threats.
  • Advance Detection: collaborate with Detection Engineers to rapidly develop and deploy new detections, composite rules, and dashboards based on discovered threat Tactics, Techniques, and Procedures (TTPs).
  • CTI-Driven Threat Hunts: collaborate closely with the Cyber Threat Intelligence (CTI) team to analyze relevant intel, extract actionable insights, and detect potential Indicators of Compromise (IoC) associated with Advanced Persistent Threats (APTs).
The day-to-day

A typical day involves a blend of deep investigation, collaboration, and continuous learning:

  • Monitoring & Triaging Alerts: security monitoring, managing security cases & tickets, security incident analysis, and other security tasks.
  • Security Log Reviews: analyzing a variety of security logs to identify actionable events (SIEM reports-alerts-tickets, system, network, security monitoring tools).
  • Event Analysis: determine the attack type and scope based on the triage of events collected.
  • Problem Solving: use critical thinking to navigate complex problem-sets (technical and non-technical) with real‑world impacts to business and stakeholders when triaging system & network events.
  • Documentation: capture all investigative, response, and remediation activities within the case management platform. Ensure each case includes a detailed triage, captured artifacts, and any IOCs to support clear tracking of security team efforts of associated tasks.
  • Detection Tuning: provide feedback into the design, implementation, and administration of security tools/ rules to reduce false positives.
  • Mitigation Support: analyze data sets, determine the gaps and recommend fixes to appropriate stakeholders.
  • Reporting: document and communicate findings clearly to both technical and non‑technical stakeholders, detailing the threat, its potential impact, and actionable remediation steps.
What you’ll need
  • Experience: 4+ years of experience and training in the field of cyber security monitoring and analysis, incident response, cyber threat analysis, and vulnerability analysis.
  • Incident Response Lifecycle: 2+ years of experience with the Incident Response lifecycle (Preparation, Detection & Analysis, Containment, Eradication & Recovery, Post‑Incident Activity) and the ability to lead the technical aspects of an investigation.
  • Education: Bachelor’s degree in Information Security, Forensics, Computer Science related fields or equivalent experience.
  • Certification: must possess a DoD 8140 Intermediate (or above) certification or be able to obtain one…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary