Staff Detection & Response Security Engineer
Confirmed live in the last 24 hours

201-500 employees

AI-powered enterprise data platform
Company Overview
Hyperscience is on a mission to connect human and artificial intelligence to solve tomorrow's automation challenges today, creating better outcomes for customers, companies, and the world.
AI & Machine Learning
Financial Services
Government & Public Sector

Company Stage

Series E

Total Funding





New York, New York

Growth & Insights

6 month growth


1 year growth


2 year growth

Remote in USA
Experience Level
Desired Skills
Data Analysis
IT & Security
  • Proven experience in cybersecurity, specifically in threat detection, incident response, and security monitoring.
  • Proficiency in security technologies such as SIEM, IDS/IPS, EDR, and threat intelligence platforms.
  • Strong understanding of network protocols, malware analysis, and cyber threat intelligence.
  • Strong understanding of cybersecurity frameworks, compliance requirements, and industry best practices (e.g., NIST, ISO 27001, CIS Controls).
  • Experience with scripting languages (e.g., Python, PowerShell) for automation and data analysis.
  • Strong understanding of containerization technology such as Docker and Kubernetes, and the ability to analyze its system logs.
  • Hands-on experience with infrastructure-as-code technologies, such as Terraform
  • Hands-on experience deploying and using multiple AWS cloud security products, such as Security Hub, GuardDuty, Inspector and WAF
  • Systematic problem-solving approach, coupled with strong communication skills and a sense of ownership and drive
  • Bachelor's degree in Computer Science, Information Security, or a related field (Master's preferred)
  • Must be able to obtain and maintain US Security Clearance for specific responsibilities related to this role. US Citizenship is a requirement for US Security Clearance
  • Utilize advanced security tools and technologies to detect and analyze security threats and incidents across our entire tech stack.
  • Conduct deep analysis of security alerts, logs, and data to identify patterns and potential indicators of compromise (IoCs).
  • Develop and execute incident response plans to swiftly contain and mitigate security incidents.
  • Coordinate with cross-functional teams to investigate and resolve security incidents, ensuring minimal impact on business operations.
  • Establish and maintain an effective security monitoring system to continuously monitor network traffic, logs, and system behavior for anomalies or potential security incidents.
  • Implement automated alerting and reporting mechanisms to improve incident response times.
  • Conduct vulnerability assessments and penetration tests to identify security weaknesses and propose appropriate remediation measures.
  • Stay up-to-date with the latest threat intelligence to enhance threat detection capabilities and incident response strategies.
  • Integrate threat intelligence feeds into security systems to improve proactive threat hunting and analysis.
  • Document incident response procedures, playbooks, security events, and incident details for post-incident analysis and improvement.
  • Generate regular and ad-hoc reports to communicate security findings, incident trends, and mitigation efforts to management and stakeholders.