Aisle is redefining how enterprises secure their software with an AI agent for autonomous vulnerability remediation. Vulnerabilities are the #1 root cause of cyber incidents, yet most organizations take weeks or months to patch what attackers exploit in days. We’re changing that.
Our mission is to protect democratic societies from the most sophisticated cyberattacks. We do that by giving organizations - including those operating critical infrastructure - the power to harden their systems and resolve security issues at superhuman speed and scale. Backed by world-class founders and advisors, we’re creating a new category in cybersecurity at the intersection of AI, automation, and enterprise resilience.
We’re a small, talent-dense team spread across the US, Europe, and Israel. We value high ownership, high velocity, and low-ego collaboration. If you want to work with world-class minds in AI and security, thrive in fast-moving environments, and care about solving one of the toughest challenges in tech, Aisle is the place for you.
Perform real-time monitoring of security events and incidents; analyze logs and data; and take appropriate actions to mitigate risks and prevent recurrence.
Respond to security incidents, including but not limited to, malware infections, data breaches, insider threats, and network intrusions.
Conduct digital forensics investigations to identify, collect, and analyze digital evidence in support of cybersecurity incidents and investigations.
Develop and maintain incident response plans and procedures, including documentation of incident details, analysis, and response activities.
Collaborate with cross-functional teams, including IT, legal, and management, to coordinate incident response efforts and ensure timely and effective resolution of security incidents.
Stay current with the latest threats, vulnerabilities, and cybersecurity trends, and provide recommendations for improving incident response processes and procedures.
Create comprehensive and actionable reports on incident response activities, findings, and post-mortem recommendations for management and other relevant stakeholders.
Bachelor's degree in Computer Information Systems, Management Information Systems, Cybersecurity, Computer Science, Information Technology, or a related field.
Proven hands-on experience in digital forensics and incident response, including conducting investigations, analyzing digital evidence, and responding to security incidents.
Strong understanding of computer networks, operating systems, and cybersecurity concepts.
Familiarity with incident response frameworks, tools, and techniques.
Proficiency in scripting languages for automating incident response tasks, such as Python, PowerShell, Perl, or Ruby.
Experience with Windows, Unix/Linux, and Mac OS X operating systems, as well as cloud technologies such as AWS, Azure, or Google Cloud.
Excellent critical thinking, problem-solving, and analytical skills.
Good written and verbal communication skills in English.
Strong organizational and time management skills.
Professional certifications such as OSCP, OSCE, GIAC CPEN, CREST CRT, or equivalent.
Knowledge of information security standards such as ISO27001, PCI DSS, GDPR, NIST, SOX.
Experience with systems development, systems administration, and/or network administration.
Previous experience in responsible disclosure and bug bounties.
If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.
The Associate Director, Cyber Defense at Emory will lead security operations, incident response, and vulnerability management while providing strategic guidance and supervising information security professionals across the university.
Experienced enterprise and solution architect needed to lead architecture roadmaps and integrate cloud, data, application, and infrastructure solutions for FAA modernization efforts.
Experienced Windows System Administrator needed to manage Azure Entra ID, Microsoft 365, and SharePoint for a global leader in webcam and visual data solutions.
Experienced Applications Engineer needed to support and troubleshoot Oracle Applications in a production environment, providing on-call weekend coverage and collaborating with global teams.
CACI is hiring a Junior Business Systems Analyst to support web-based financial management systems, perform data analysis and requirements definition, and assist with testing and user support for high-visibility government programs.
Senior IT applications leader to oversee Epic, Workday and Infor implementations and ongoing application strategy across a multi-hospital health system, driving informatics, governance and change management.
Peraton is hiring a Junior Cyber Security Analyst at MacDill AFB to perform SOC monitoring, incident response, and reporting in support of USSOCOM's global operations.
Serve as the primary production support engineer for a remote US team, managing incidents, optimizing system performance, and working with cross-functional teams to improve reliability and scalability.
Provide independent technical assessments and validation of cloud and on-prem security controls at MUFG, executing test scripts, documenting evidence, and supporting remediation to manage technology risk.
TekSynap seeks a midnight-shift Network Engineer to support the FBI's IT Infrastructure Division by monitoring, troubleshooting, and resolving network incidents and outages.
Synthego is hiring a Senior Systems Engineer to architect and maintain secure, high-performance IT systems that support cutting-edge CRISPR research across hybrid environments.
stow is hiring an onsite IT Coordinator in Adairsville to manage plant IT infrastructure and production applications while coordinating with Corporate IT.
Lead a team of developers and administrators to manage and improve Magnet Forensics’ internal business applications, driving integrations, process improvements, and governance across the organization.