Operate and improve security detection, response, and automation across SIEM/EDR platforms (CrowdStrike, Taegis, Varonis). Lead incident response, threat hunting, telemetry tuning, gap analysis, runbook updates, and AI governance monitoring while collaborating with offensive and defensive teams.
Bounteous is a premier end-to-end digital transformation consultancy dedicated to partnering with ambitious brands to create digital solutions for today’s complex challenges and tomorrow’s opportunities. With uncompromising standards for technical and domain expertise, we deliver innovative and strategic solutions in Strategy, Analytics, Digital Engineering, Cloud, Data & AI, Experience Design, and Marketing.
Our Co-Innovation methodology is a unique engagement model designed to align interests and accelerate value creation. Our clients worldwide benefit from the skills and expertise of over 4,000+ expert team members across the Americas, APAC, and EMEA. By partnering with leading technology providers, we craft transformative digital experiences that enhance customer engagement and drive business success.
Information Security Responsibilities
- Promote and enforce awareness of key information security practices, including acceptable use of information assets, malware protection, and password security protocols
- Identify, assess, and report security risks, focusing on how these risks impact the confidentiality, integrity, and availability of information assets
- Understand and evaluate how data is stored, processed, or transmitted, ensuring compliance with data privacy and protection standards (GDPR, CCPA, etc.)
- Ensure data protection measures are integrated throughout the information lifecycle to safeguard sensitive information
Role Description:
- Information Security Operations Engineer is a member of the Gen Re Security team, who will leverage extensive
- The candidate shall work closely with Security and other IT practice leads to ensure that detection logic, incident
- The candidate must have a strong background in technology, security and metrics, and must be highly adaptive.
- The candidate must be highly organized and analytical and is expected to partner and mentor effectively with other teams on an ongoing basis.
experience in security operations to oversee and enhance proactive defenses and response capabilities.
response workflows, data quality, automation, and team collaboration are continuously improved and effectively
managed. The role entails strategic planning, research, testing, and implementation of new solutions, as well as the
operation and maintenance of current solutions.
Specific responsibilities:
- Refine detection logic and improve alert fidelity across platforms such as CrowdStrike, Taegis, and
- Enhance incident response workflows and update runbooks to reflect current tooling and evolving
- Perform gap analysis and coverage mapping to ensure security data quality, log integrity, and timestamp
- Implement security automation and orchestration to reduce manual effort and improve operational
- Conduct reviews of alerts and enforce effective timely incident investigation.
- Formalize collaboration between offensive and defensive security teams to integrate findings into
- Monitor and optimize SIEM telemetry to improve detection capabilities and reduce false positives.
- Lead threat hunting initiatives and proactively identify indicators of compromise across enterprise
- Perform end-to-end security incident response, including triage, containment, eradication, recovery, and
- Monitor and assess AI-driven tooling and platforms to ensure compliance with governance policies,
Varonis.
threat scenarios.
accuracy.
efficiency.
detection logic and strengthen security posture.
systems.
post-incident analysis.
regulatory requirements, and risk management standards
Experience/Skills Required:
- Proficiency with SIEM, EDR, and Infrastructure as a Service.
- 5+ years of IT Support experience focusing on IT Security and Security Operations.
- Outstanding communication (verbal, written, and listening) and customer service skills.
- Familiarity with IT security controls, protocols, and best practices.
- Ability to interact with all levels of management.
- Self-starter with the ability to work independently and in a team setting.
- It is the continuing policy of General Re Corporation to afford equal employment opportunity to qualified individuals regardless of their race, color, religion, sex, sexual orientation, national origin, age, marital status, disability or citizenship and to conform to applicable laws and regulations.
- A Berkshire Hathaway Company
- High level of accountability, integrity, and dependability.
- Excellent attention to detail.
- Strong time, project, and people management abilities.
- Experience developing and enforcing AI governance frameworks and monitoring AI-driven tools for compliance with regulatory and organizational standards.
Education Required:
- Bachelor’s or master’s degree in computer science, information systems or other related field, or
- Professional security management certification, such as ISC(2) Certified Information Systems
- Security Professional (CISSP), SANS GIAC Information Security Professional (GI)
equivalent work experience.
We invite you to stay connected with us by subscribing to our monthly job openings alert here.
Bounteous is proud to be an equal opportunity employer. Bounteous does not discriminate on the basis of race, religion, color, sex, gender identity, sexual orientation, age, physical or mental disability, national origin, veteran status, or any other status protected under federal, state, or local law. Bounteous is willing to sponsor eligible candidates for employment visas.
#BI-Remote
#LI-Remote
Top Skills
Crowdstrike,Taegis,Varonis,Siem,Edr,Iaas,Soar,Ai-Driven Tooling
Similar Jobs at Bounteous
Agency • Digital Media • eCommerce • Professional Services • Software • Analytics • Consulting
Lead security operations efforts including refining detection logic, improving incident response and runbooks, performing gap analyses, implementing automation, monitoring SIEM/EDR telemetry, threat hunting, and ensuring data protection and AI-tooling governance.
Top Skills:
Ai-Driven ToolingCrowdstrikeEdrInfrastructure As A ServiceSecurity Automation And OrchestrationSIEMTaegisVaronis
Agency • Digital Media • eCommerce • Professional Services • Software • Analytics • Consulting
Lead IAM operations including onboarding/offboarding, access request fulfillment, audit/compliance coordination, ticket SLA management, training, process improvements, UAT coordination, and IAM documentation.
Top Skills:
Azure AdAzure MfaAzure PimBeyond TrustIamSaviyntServicenowVaronis
Agency • Digital Media • eCommerce • Professional Services • Software • Analytics • Consulting
Lead client-facing data solutioning and pre-sales efforts for Consumer verticals, design executable data architectures, support pursuit to close, and provide ~50% hands-on delivery and architectural oversight while ensuring information security and data privacy compliance.
Top Skills:
Databricks,Snowflake,Aws,Azure,Gcp
What you need to know about the Charlotte Tech Scene
Ranked among the hottest tech cities in 2024 by CompTIA, Charlotte is quickly cementing its place as a major U.S. tech hub. Home to more than 90,000 tech workers, the city’s ecosystem is primed for continued growth, fueled by billions in annual funding from heavyweights like Microsoft and RevTech Labs, which has created thousands of fintech jobs and made the city a go-to for tech pros looking for their next big opportunity.
Key Facts About Charlotte Tech
- Number of Tech Workers: 90,859; 6.5% of overall workforce (2024 CompTIA survey)
- Major Tech Employers: Lowe’s, Bank of America, TIAA, Microsoft, Honeywell
- Key Industries: Fintech, artificial intelligence, cybersecurity, cloud computing, e-commerce
- Funding Landscape: $3.1 billion in venture capital funding in 2024 (CED)
- Notable Investors: Microsoft, Google, Falfurrias Management Partners, RevTech Labs Foundation
- Research Centers and Universities: University of North Carolina at Charlotte, Northeastern University, North Carolina Research Campus

