VerTALENTS is a subsidiary of VerSprite Cybersecurity. Specializing in technology staffing and utilizing a network of technical clients, VerTALENTS connects top level technical talent with industry clients through various methods and expands not only clients talent network, but candidates job search as well. At the bottom line, VerTALENTS adds value to both clients and candidates alike.
We work with clients to fill both full-time and contracting opportunities, so If the following job interests you, please apply to learn more!
Security Operations Analyst
enterprise mssp | ai-augmented soc | detection engineering focus
Location: Remote Costa Rica or Argentina (u.s. time zone alignment required)
Who we are:
We operate a next-generation, ai-augmented security operations center supporting enterprise clients across multiple industries. This is not a traditional alert-triage soc role.
Our analysts investigate sophisticated threats, engineer high-fidelity detections, leverage ai to accelerate analysis, and continuously improve how security operations are executed across multiple client environments.
If you are looking to simply manage a queue, this is not the role.
if you want ownership over investigation quality, detection precision, and automation impact…keep reading.
What you will own
enterprise-grade investigations
- lead structured investigations across siem, edr, email security, and cloud telemetry
- determine root cause and blast radius — not just close alerts
- correlate telemetry with threat intelligence to assess impact
- deliver clear, executive-ready findings tailored to enterprise stakeholders
- support containment, eradication, and recovery efforts
detection engineering & threat hunting
- develop and tune siem detection rules across multiple environments
- create and refine yara rules for malware detection
- engineer new detection use cases aligned to emerging threats
- conduct hypothesis-driven threat hunts
- reduce false positives through precision tuning
- map detections to mitre attack where appropriate
you will influence detection quality directly, not just consume alerts.
ai-augmented analysis & automation
- leverage ai tooling to accelerate log analysis and enrichment
- validate ai outputs and refine workflows
- identify repetitive investigative tasks suitable for automation
- collaborate on operationalizing ai-assisted playbooks
- increase efficiency without sacrificing analytical rigor
ai is an accelerator, not a substitute for judgement.
continuous improvement
- conduct post-incident detection gap reviews
- translate lessons learned into measurable detection improvements
- contribute to knowledge base and investigation standards
- track and improve operational performance metrics
Required Technical Experience
- hands-on experience with at least one major siem platform (splunk, sentinel, elastic, google secops, qradar, etc.)
- experience with edr/xdr platforms (crowdstrike, sentinelone, defender, etc.)
- detection rule creation or tuning experience
- experience writing or modifying yara rules
- understanding of windows, linux, and cloud telemetry
- threat intelligence and ioc handling experience
- incident response lifecycle familiarity
- scripting capability (python, powershell, or similar)
- strong written english for client-facing reporting
It would be great if you have
- mssp or multi-tenant enterprise experience
- soar exposure
- mitre att&ck mapping experience
- cloud security investigation (aws/azure/gcp)
- experience reducing false positives at scale
- experience using ai tools in investigation workflows
- malware analysis fundamentals
we value
- ownership over outcomes
- analytical discipline
- technical curiosity
- clear business communication
- calm under pressure
- comfort operating across multiple enterprise environments
If you want to grow beyond traditional soc boundaries and help shape modern security operations , we want to meet you.