StaffAttract
  • Login
  • Create Account
  • Products
    • Private Ad Placement
    • Reports Management
    • Publisher Monetization
    • Search Jobs
  • About Us
  • Contact Us
  • Unsubscribe

Login

Forgot Password?

Create Account

Job title, industry, keywords, etc.
City, State or Postcode

Lead Analyst, Security

Chime - San Francisco, CA

Apply Now

Job Description

Lead Analyst, Security As a Lead Security Operations Center (SOC) Analyst you are experienced in looking for things amiss in the environment (and contributing to that detection process,) identifying whether it's a bad guy or something gone sideways by leveraging your experience and deep understanding of hosts, networks, Cloud, and all things security, and leading response to security events and the incidents those sometimes turn into. You are passionate about security and dedicated to continuously improving detection and response capabilities. The base salary offered for this role and level of experience will begin at $148,000 and up to $205,000. Full-time employees are also eligible for a bonus, competitive equity package, and benefits. The actual base salary offered may be higher, depending on your location, skills, qualifications, and experience. In this role, you can expect to: Serve as a technical expert driving Chime's security incident response program, investigating, and coordinating response Work closely with other Security teams, Engineering, Fraud, and other stakeholders to monitor and analyze events and signals across various logical environments Gather threat intelligence, identify adversaries, tools and techniques, and mitigate and respond to them Participate in the maturation of the IR program, including technical and policy aspects Drive efforts to hunt for adversary activity in the environment Mentor junior analysts in your mysterious ways Learn and grow as you go Execute on team and company OKRs To thrive in this role, you have: At least 6/4 years cyber security experience, 3/2 of which includes being in the trenches in a SOC/CSIRT environment Experience investigating cybersecurity events and incidents using a full suite of alerting and response tools, digital forensic or malware analysis tools Experience with network and host-based security, cloud security, threat hunting, purple or red team engagements, and pentesting tools. Experience with frameworks such as the Cyber Kill Chain, MITRE ATT&CK, NIST Familiarity with networking concepts in both physical (routers, switches, firewalls) and cloud environments (IAM, VPCs, Containers) The ability to multi-task and wear multiple hats and top notch communication skills Experience in FinTech as an added bonus!

Created: 2026-03-04

➤
Footer Logo
Privacy Policy | Terms & Conditions | Contact Us | About Us
Designed, Developed and Maintained by: NextGen TechEdge Solutions Pvt. Ltd.