Let’s get started
By clicking ‘Next’, I agree to the Terms of Service
and Privacy Policy, and consent to receive emails from Rise
Jobs / Job page
Senior Security Specialist – Incident Management image - Rise Careers
Job details

Senior Security Specialist – Incident Management

About HighLevel

HighLevel is a cloud-based, all-in-one white-label marketing and sales platform that empowers marketing agencies, entrepreneurs, and businesses to elevate their digital presence and drive growth. We are proud to support a global and growing community of over 2 million businesses, from marketing agencies to entrepreneurs to small businesses and beyond. Our platform empowers users across industries to streamline operations, drive growth, and crush their goals.


HighLevel processes over 15 billion API hits and handles more than 2.5 billion message events every day. Our platform manages 470 terabytes of data distributed across five databases, operates with a network of over 250 micro-services, and supports over 1 million domain names.


Our People

With over 1,500 team members across 15+ countries, we operate in a global, remote-first environment. We are building more than software; we are building a global community rooted in creativity, collaboration, and impact. We take pride in cultivating a culture where innovation thrives, ideas are celebrated, and people come first, no matter where they call home.


Our Impact

Every month, our platform powers over 1.5 billion messages, helps generate over 200 million leads, and facilitates over 20 million conversations for the more than 2 million businesses we serve. Behind those numbers are real people growing their companies, connecting with customers, and making their mark - and we get to help make that happen.


Learn more about us on our YouTube Channel or Blog Posts


About The Role

We are seeking an experienced and proactive Senior Security Specialist – Incident Management to join our security operations team. This role will be responsible for monitoring, detecting, analyzing, and responding to security incidents. The ideal candidate will have deep expertise in incident management, strong analytical skills, and hands-on experience with enterprise-grade detection and response platforms. The analyst will lead investigations, coordinate with cross-functional teams, and provide actionable insights to reduce risk and strengthen the organization’s overall security posture.


Key Responsibilities

- Monitor and analyze alerts from SIEM, EDR, CSPM, and cloud-native security platforms.

- Perform initial triage, validation, and escalation of security alerts and suspicious activity.

- Develop and tune detection rules, dashboards, and queries for improved monitoring.

- Lead incident containment, eradication, and recovery activities.

- Conduct in-depth investigations of endpoint, cloud, and network-based threats.

- Maintain and improve incident response playbooks aligned with NIST 800-61 and MITRE ATT&CK.

- Perform proactive threat hunting across SIEM, EDR, and cloud environments.

- Conduct forensic analysis, root cause investigations, and evidence collection.

- Apply threat intelligence to enhance detection and reduce dwell time.

- Partner with IT, Cloud, Security, Legal, and Compliance teams for coordinated incident resolution.

- Work with LEA in the US to receive threat intelligence and share updates whenever required.

- Investigate container security incidents (e.g., Kubernetes, Docker) including misconfigurations, runtime threats, and unauthorized access.

- Analyze application-layer attacks such as SQL injection, XSS, RCE, and API abuse.

- Collaborate with DevOps/AppSec teams to assess vulnerabilities identified during incidents and provide remediation guidance.

- Conduct log analysis and forensic review of application and container environments to identify compromise indicators.

- Provide clear, actionable updates to both technical and executive audiences.

- Prepare detailed incident reports and present monthly/quarterly security metrics.

- Recommend improvements in logging, monitoring, and automation (SOAR).

- Track and report KPIs such as MTTR, incident volume, and trend analysis.

- Contribute to tabletop exercises, red/blue team simulations, and readiness drills.


Required Qualifications

- Bachelor’s degree (or equivalent experience) in Information Security, Computer Science, or related field.

- 6+ years of hands-on experience in incident management, SOC operations, or cybersecurity analysis.

- Practical expertise with:

- SIEM (e.g., Google SecOps / Chronicle, Splunk, Microsoft etc.)

- EDR (e.g., SentinelOne, CrowdStrike, Microsoft etc.)

- CSPM / Cloud Security (e.g., GCP Security, Orca, Prisma Cloud, Microsoft etc.)

- Strong knowledge of incident response frameworks (NIST 800-61, MITRE ATT&CK).

- Experience writing detection queries, rules, and dashboards in SIEM/EDR tools.

- Excellent problem-solving, documentation, and communication skills.


Preferred Qualifications

- Experience with container security investigations (Kubernetes, Docker) and workload forensics.

- Exposure to application security incident investigation (web app attacks, API misuse, vulnerabilities).

- Certifications such as CompTIA Security+, CySA+, GCIH, GCFA, GCIA, CISSP, or CISM.

- Cloud security certification (e.g., Google Professional Cloud Security Engineer).

- Knowledge of U.S. compliance frameworks: NIST CSF, HIPAA, PCI DSS, SOX, CCPA/CPRA, FedRAMP.

- Familiarity with scripting/automation (Python, PowerShell, bash) for SOC workflows.


EEO Statement

The company is an Equal Opportunity Employer. As an employer subject to affirmative action regulations, we invite you to voluntarily provide the following demographic information. This information is used solely for compliance with government record keeping, reporting, and other legal requirements. Providing this information is voluntary and refusal to do so will not affect your application status. This data will be kept separate from your application and will not be used in the hiring decision.


highlevel Glassdoor Company Review
4.3 Glassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star icon Glassdoor star icon
highlevel DE&I Review
No rating Glassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star icon
CEO of highlevel
highlevel CEO photo
Shaun Clark
Approve of CEO

Average salary estimate

$150000 / YEARLY (est.)
min
max
$130000K
$170000K

If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.

Similar Jobs
Photo of the Rise User

Expression is hiring a Junior Security Engineer focused on endpoint protection to support NTIA with vulnerability management, C&A activities, and federal compliance efforts.

Posted 16 hours ago

Dimensional is hiring an Infrastructure Cloud Engineer to architect, automate, and secure hybrid Windows/Citrix and multi-cloud infrastructure using IaC and DevOps practices.

Photo of the Rise User

Nest Health is hiring a Senior Analyst, End User Technologies to manage endpoint support, Microsoft 365/Entra/Intune administration, and onboarding enablement for a growing, mission-driven healthcare startup.

Photo of the Rise User
US Physical Therapy Hybrid 1300 W Sam Houston Pkwy S, Houston, TX 77042, USA
Posted 12 hours ago

U.S. Physical Therapy is hiring an IT Asset & Inventory Specialist to manage and reconcile hardware and software inventory, coordinate vendor procurement, and support staging and retirement of equipment at the West Houston corporate office.

Posted 19 minutes ago

LEARN is hiring a seasoned CTO to lead statewide network operations, security, and technology strategy while partnering with executive leadership and the board to deliver and expand member-focused services.

Photo of the Rise User
Posted 3 hours ago

SmartCommerce is hiring a hands-on Information Security Manager to lead security strategy, compliance (SOC 2, GDPR/CCPA), incident response, and vendor risk programs in a fully remote, growth-oriented environment.

Photo of the Rise User
QODE Hybrid No location specified
Posted 2 hours ago

Systems Administrator needed to administer and support SharePoint and Power Platform environments for a Florida government agency in a full-time, onsite contract role in Tallahassee.

SciTec Hybrid No location specified
Posted 19 hours ago

SciTec is hiring an AWS Infrastructure Administrator to manage, harden, and scale cloud infrastructure and web applications supporting Department of Defense and U.S. Government customers.

Experienced Active Directory Administrator needed to manage Windows Server environments and AD services for a high-visibility Defense Enterprise Email program in Oklahoma City.

Lehigh Valley Health Network is hiring a Senior Clinical Revenue Applications & Support Analyst to design, build and support Epic-based clinical and revenue applications while partnering with clinical stakeholders and IT to deliver secure, tested solutions.

Photo of the Rise User
Posted 21 hours ago

Provide on-site desktop and infrastructure support at DXC Technology's Houston office, assisting with troubleshooting, device imaging, documentation, and daily operational tasks.

Photo of the Rise User
Lake Sunapee VNA Hybrid No location specified
Posted 24 hours ago

Provide hands-on IT support, system maintenance, and HIPAA-focused security oversight for a mid-sized nonprofit home health and hospice agency.

Senior Business Systems Analyst sought by the Oregon Health Authority to lead SaaS-based modernization and migration of mission-critical financial and eligibility systems in a fully remote, permanent role.

MATCH
Calculating your matching score...
FUNDING
SENIORITY LEVEL REQUIREMENT
TEAM SIZE
EMPLOYMENT TYPE
Full-time, hybrid
DATE POSTED
October 5, 2025
Risa star 🔮 Hi, I'm Risa! Your AI
Career Copilot
Want to see a list of jobs tailored to
you, just ask me below!