7AI is on a mission to put swarming AI agents in the hands of defenders to offload non-human work, shift people up, and finally focus on achieving the security outcomes that teams have been searching for. We are seeking curious, detail-oriented, technically adept Security Analysts who thrive on solving complex, high-stakes puzzles and are deeply customer-obsessed to continue our mission of building the world’s first Agentic Security Platform.
What You’ll Do:
Analyze and validate investigations completed by the AI Agents for accuracy, completeness, and risk
Correlate data from various data sources including cloud, endpoint, identity, network, etc. to understand the full picture of a malicious activity
Investigate malicious activity that the 7AI Agents responded to and understand the complexity of the attack that was stopped including the risk that was prevented for customers
Use our advanced AI Agents to hunt in customer environments to detect and remediate emerging threats, ultimately contributing to detections that will be folded back into the product
Assist customers with ongoing threat monitoring, triage, and prioritization of security alerts as needed but especially during incidents to resolve threats and secure the environment
Proactively identify potential threats and anomalies in customer environments by reviewing logs and malicious findings
Utilize your supreme communication skills to engage with customers who vary in their level of technical depth and focus (from SOC analysts to CISOs)
Architect processes while we build out this elite organization to scale the operation sustainably while maintaining consistent quality
Collaborate with the Engineering and Product teams, providing feedback on the customer experience and assist in optimizing and tuning the AI platform
Stay current with emerging cybersecurity trends, vulnerabilities, and new attack techniques, especially the field of AI-driven attacks
Required Qualifications:
2+ years of experience in Cyber Security Operations
Hands-on experience with investigating alerts and across multiple sources (endpoint, network, identity, email, cloud, etc.)
Strong understanding of security monitoring tools (XDR, SIEM, IDS/IPS, IDP, etc.)
Familiarity with log \ telemetry concepts
Experience analyzing and investigating security alerts from multiple sources, including intrusion detection systems, network monitoring tools, and endpoint protection platforms
Working knowledge of common attack techniques and frameworks (MITRE ATT&CK) and incident triage methodologies
Strong analytical and problem-solving skills, with the ability to verify AI-driven analysis and make independent security decisions
Data querying experience with SIEM querying technologies (SPL, KQL, FQL, SQL, etc) and familiarity with log / telemetry concepts
Familiarity with Malware Analysis methods
Great interpersonal skills with a service oriented mindset
Proven track record of successfully collaborating in a team
Preferred qualifications:
Prior experience in a Managed Services environment
Incident Handling experience
Relevant certifications: Security+, GSEC, GCIH