Fresenius Medical Care

Creating a future worth living. For patients. Worldwide. Every day.

Principal Analyst Cyber Security Operations - SOAR

Security OperationsSecurity OperationsFull TimeRemoteTeam 10,001+Since 1996H1B SponsorCompany SiteLinkedIn

Location

United States

Posted

6 days ago

Salary

Not specified

PythonSOARAPI IntegrationREST APIJSONCi/cdGit HubGit LabAzure Dev OpsEDRSIEMIncident ResponseThreat DetectionSecurity Engineering

Job Description

This description is a summary of our understanding of the job description. Click on 'Apply' button to find out more.

Role Description

Fresenius Medical Care’s CSOC seeks a Principal Analyst to lead engineering and development of advanced enterprise-wide detection and threat analytics capabilities. The role drives security engineering strategy, AI enhanced detection logic, threat modeling, and continuous tuning across diverse platforms. It also leads SOAR engineering—building automations, integrating security tools, and creating workflows that reduce manual work and speed up response—while partnering closely with Security and Global IT teams. This is a U.S.-based remote position supporting Fresenius Medical Care’s Global Cyber Security Operations Center.

Principal Duties and Responsibilities

  • Lead architecture, development, and maintenance of SOAR playbooks and automation pipelines.
  • Automate repetitive security operations and security engineering workflows (EDR, VM scanning, SIEM enrichment, IR actions).
  • Integrate security tools and platforms using APIs, scripting, and microservices.
  • Improve MTTR and reduce operational overhead through intelligent automation by closely partnering with Security Engineering, IT Operations, and Cloud Teams.
  • Develop KPIs to measure automation impact and report operational improvements.
  • Lead POCs for new automation platforms and evaluate opportunities for AI-based operations.
  • Provide mentorship and code reviews for automation engineers and analysts.
  • Partner with security engineering on telemetry strategy, logging requirements, and architectural standards for monitoring visibility.
  • Integrate AI/ML driven detection capabilities into existing pipelines, validating model performance and reducing false positives.
  • Maintain ingestion pipelines, parsing logic, normalization rules, and event taxonomies across critical log sources: identity, endpoint, cloud, network, application, and medical systems.
  • Lead the design, implementation, and optimization of enterprise-wide detection content, including correlation rules, behavioral analytics, machine learning assisted detections, and anomaly models.
  • Develop detection playbooks and logic focused on lateral movement, credential abuse, insider threats, privilege escalation, cloud compromise, and advanced persistent threats.
  • Tune, optimize, and enrich detection pipelines with contextual data (identity, asset, threat intelligence, vulnerability data).
  • Mentor analysts and engineers globally on detection logic development, data analytics, and platform best practices.
  • Serve as a senior escalation point for complex security incidents and investigations.

Physical Demands and Working Conditions

The physical demands and work environment characteristics represent those typically encountered while performing essential duties. Reasonable accommodation may be made as needed. This is a remote role with availability expected during core hours and during escalations as required.

Supervision

Provides technical leadership and mentorship to threat engineers, automation engineers, and security operations analysts globally. Does not directly manage staff.

Education

  • Minimum Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or related field (or equivalent professional experience).

Experience and Required Skills

  • 5+ years in automation engineering, SOAR engineering, or DevSecOps.
  • Strong scripting/programming experience (Python required; PowerShell, Go, or NodeJS a plus).
  • Hands-on experience with:
    • SOAR platforms (Cortex XSOAR, Splunk SOAR, Microsoft Sentinel automation)
    • API integrations and REST/JSON workflows
    • CI/CD tools (GitHub, GitLab, Azure DevOps)
  • Deep understanding of SOC processes, alerting workflows, and incident response.
  • Experience integrating EDR, VM, identity, and cloud security tools.

Preferred

  • Experience with AI-driven automation or LLM-assisted workflow design.
  • Certifications: GCSA, GCFA, GCIH, scripting/DevOps certs.
  • Experience in hybrid or multi-cloud environments.

Compensation

The rate of pay for this position will depend on the successful candidate’s work location and qualifications, including relevant education, work experience, skills, and competencies. Annual Rate: $117,700.00 - $196,200.00 for Waltham, MA location.

Benefits

  • Comprehensive benefits package including medical, dental, and vision insurance.
  • 401(k) with company match.
  • Paid time off.
  • Parental leave.
  • Potential for performance-based bonuses depending on company and individual performance.

Benefits

  • Comprehensive benefits package including medical, dental, and vision insurance.
  • 401(k) with company match.
  • Paid time off.
  • Parental leave.
  • Potential for performance-based bonuses depending on company and individual performance.

Related Categories

Related Job Pages

More Security Operations Jobs

Full TimeRemoteTeam 51-200

The engineer will operate and support a live carrier-grade VoIP platform, responding to alerts, troubleshooting incidents like SIP/RTP issues, and participating in a light on-call rotation. Responsibilities also include improving monitoring, automation, and providing clear technical explanations during escalations.

United States

Security Operations Intern

Zscaler

We make it easy to secure your cloud transformation. Get fast, secure, and direct access to apps without appliances.

Security Operations6 days ago
InternshipRemoteTeam 5,001-10,000Since 2008H1B Sponsor

Federal Security Operations Intern at Zscaler focusing on cybersecurity

Splunk
United States

Federal Security Operations - SkillBridge Intern

Zscaler

We make it easy to secure your cloud transformation. Get fast, secure, and direct access to apps without appliances.

Security Operations7 days ago
Full TimeRemoteTeam 5,001-10,000Since 2008H1B Sponsor

We are looking for a Federal Security Operations - SkillBridge Intern to join our Enterprise Security team. This is a remote role, reporting to the Director of Federal Security Operations and Insider Threat. Our Federal Security team is a mission-focused group dedicated to defend...

SIEMXDRCrowdStrike FalconSplunkGoogle SecOpsAzureAWSGCPVMwareHyper-VKVMSAMLLDAPActive Directory
United States

Security Specialist II

GARDAWORLD FEDERAL SERVICES LLC

GardaWorld Federal Services and family of companies is an EOE Equal Opportunity Employer Minorities/Women/Veterans/Disabled. We participate in the E-Verify Employment Verification Program.

Security Operations7 days ago
Full TimeRemote

The Security specialist is responsible for the review of personnel security clearance packets and other security functions. Review, edit, and correct candidates' e-QIP up to standards. Conduct daily updates for reporting purposes and to control/manage candidate pipeline. Register...

eQIPDISSMicrosoft OfficeDoD Secret Clearance
United States