Enable job alerts via email!

Cyber Automation Specialist

Altice USA

United States

Remote

USD 80,000 - 120,000

Full time

3 days ago
Be an early applicant

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

Optimum is seeking a Cybersecurity SOAR Specialist to enhance our security operations team. This role involves designing automation workflows to improve incident detection and response, requiring strong scripting skills and experience in cybersecurity. Join us to make security operations smarter and more effective.

Qualifications

  • 2+ years of experience in cybersecurity, preferably within a SOC.
  • Proficiency in scripting languages such as Python or JavaScript.
  • Experience with SIEM tools like Splunk or MS Sentinel.

Responsibilities

  • Design and build automated workflows for incident detection and response.
  • Enhance threat intelligence ingestion and correlation across data sources.
  • Collaborate with SOC analysts to automate repetitive tasks.

Skills

Scripting languages
Incident management
Threat intelligence
Security frameworks
Automation workflows

Education

BA in related technology field

Tools

SIEM tools
REST APIs
Infrastructure as Code
Cloud environments

Job description

Are you looking to Optimize your life? Start your exciting path to a rewarding career today!

We are Optimum, a leader in the fast-paced world of connectivity, and we're on the hunt for enthusiastic professionals to join our team! We understand that connectivity isn't just a luxury anymore – it's a necessity that empowers lives, fuels businesses, and drives innovation. A career at Optimum means you'll be enabling progress and enhancing lives by providing reliable, high-speed connectivity solutions that keep the world connected. We owe our success to our amazing product, commitment to our people and the connections we make in every community.

If you are resourceful, collaborative, team-oriented and passionate about delivering consistent excellence, Optimum is the Company for you!

We areOptimum!

Job Summary

We are seeking a highly motivated Cybersecurity SOAR (Security Orchestration, Automation, and Response) Specialist to join our growing security operations team. This role will focus on designing, developing, and maintaining automation workflows to streamline and enhance our incident detection, investigation, and response capabilities.


We’re looking for a Cybersecurity Automation Specialist who’s passionate about making security operations smarter, faster, and more effective. You’ll be the bridge between security analysts and engineering—automating detection, response, and remediation workflows to enhance security posture while reducing manual effort. If you're someone who lives at the intersection of cyber security operations and software development, we want to hear from you.


Work closely with SOC analysts, incident responders, threat hunters, and other security professionals to drive rapid, consistent, and efficient incident response—reducing manual effort through thoughtful automation.

Responsibilities
  • Design and build automated workflows to support incident detection, triage, enrichment, and response using SOAR platforms (e.g., Splunk SOAR, Cortex XSOAR, Tines, etc.)
  • Create feedback loops and partner closely with the Security Operations Center (SOC) analysts to understand pain points and repetitive tasks, turning them into automation use cases.
  • Enhance threat intelligence ingestion and correlation across multiple data sources (EDR, NDR, SIEM, Ticketing Systems, etc.).
  • Create interactive workbooks (e.g., Jupyter notebooks) to supercharge analysts and their ability to triage and respond.
  • Create enrichment pipelines using OSINT sources and threat intelligence feeds, vulnerability management data, and other internal data sources.
  • Create building blocks and reusable modules, connectors, and integrations with third-party APIs, tools, and platforms.
  • Document all developed playbooks, scripts, infrastructure components, and integrations to ensure maintainability, reproducibility, and contribute to our internal wiki for team-wide knowledge sharing.
  • Maintain code repository of developed SOAR functions and scripts created for incident response.
  • Understand, design, and implement CI/CD pipelines for automated deployment of security automation code.
  • Collaborate in agile workflows by participating in sprint planning, backlog grooming, and retrospectives; prioritizing SOAR tasks which will directly impact our security analysts
  • Support containerized development and deployment processes using Docker and Kubernetes.
  • Contribute to internal tooling, microservices, and serverless functions to extend SOAR capabilities.
  • Deploy security infrastructure and resources using Infrastructure as Code (IaC) to support scalable and repeatable deployment of security resources.
  • Write code as Secure-by-Default and understand what often contributes to vulnerabilities in code and applications.
  • Assist in security incident investigations and post-incident reviews.
  • Stay current with evolving cybersecurity threats, tools, and technologies.
Qualifications

Required:

  • 2+ years of experience in cybersecurity, preferably within a SOC or incident response environment. BA in related technology field acceptable as substitution for experience.
  • Proficiency in scripting languages such as Python or JavaScript.
  • Experience with SIEM tools (e.g., Splunk, MS Sentinel, LogRhythm).
  • Familiarity with REST APIs, JSON, and integrating with third-party security tools.
  • Solid understanding of security incident management, threat intelligence, and security frameworks (e.g., MITRE ATT&CK, NIST).
  • Solid understanding of modern development practices: Git, CI/CD, Infrastructure as Code (Terraform, etc.).
  • Familiarity with cloud environments (AWS, GCP, Azure) and related security tooling.

Preferred:

  • Certifications such as CISSP, GCIH, GCIA, or SOAR platform-specific certs.
  • Experience with enterprise security tools, CI/CD pipelines, and cloud environments/infrastructure.
  • Experience with containerized applications, Kubernetes, and microservices architecture.
  • Experience with event-driven or serverless architectures (e.g., AWS Lambda, Google Cloud Functions) for lightweight automation.
  • Hands-on experience automating workflows for phishing, malware, insider threats, or other common incident types.
  • Experience contributing to internal security tools, libraries, or developer platforms.

At Optimum, we're fueled by our four core pillars: Taking Ownership, Upholding Transparency, Creating Community, and Demonstrating Expertise. Our commitment to empowering employees to take responsibility and embrace proactive problem-solving underpins Taking Ownership. Upholding Transparency is at the core of our culture, with open and honest communication fostering trust among our dedicated team and loyal customers. Creating Community is more than a goal; it's our daily commitment to fostering an environment of collaboration, innovation, and positivity. Demonstrating expertise is a promise we uphold through continuous learning and engagement with our customers to consistently deliver top-quality products and services. These pillars not only shape our culture but define Optimum as a place of excellence, trustworthiness, and thriving community, and we invite you to be a part of our journey.

If you have the drive to succeed and are ready to embark on a thrilling career, seize this opportunity today, and join our winning team, so together, we'll shape the future of connectivity.

All job descriptions and required skills, qualifications and responsibilities for a particular position are subject to modification by the Company from time to time, in the Company’s discretion based on business necessity.

We are an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, creed, national origin, religion, age, disability, sex, sexual orientation, gender identity or protected veteran status, or any other basis protected by applicable federal, state, or local law. The Company provides reasonable accommodations upon request in accordance with applicable requirements.

Optimum collects personal information about its applicants for employment that may include personal identifiers, professional or employment related information, photos, education information and/or protected classifications under federal and state law. This information is collected for employment purposes, including identification, work authorization, FCRA-compliant background screening, human resource administration and compliance with federal, state, and local law.

Applicants for employment with the Company will never be asked to provide money (even if reimbursable) as part of the job application or hiring process. Please review our Fraud FAQ for further details.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.

Similar jobs

Platform Engineer 1

BlueVoyant

Remote

USD 70,000 - 100,000

8 days ago

Platform Engineer 1

BlueVoyant

College Park

Remote

USD 80,000 - 100,000

11 days ago

Principal Automation Engineer

PBG

Washington

Remote

USD 90,000 - 105,000

9 days ago

JIOCK Target Automation Specialist (Intelligence Analyst 1)- 23240

Huntington Ingalls Industries

Republic

On-site

USD 62,000 - 86,000

13 days ago

Platform Engineer, Detections

NuHarbor Security

Burlington

On-site

USD 109,000 - 134,000

Yesterday
Be an early applicant

Platform Engineer 1

BlueVoyant

Maryland

On-site

USD 80,000 - 165,000

9 days ago

OT Cybersecurity Automation Specialist

CDM Smith

Asheville

Hybrid

USD 81,000 - 135,000

21 days ago

OT Cybersecurity Automation Specialist

CDM Smith

Memphis

Hybrid

USD 81,000 - 135,000

30+ days ago

OT Cybersecurity Automation Specialist

CDM Smith

Birmingham

Hybrid

USD 81,000 - 135,000

30+ days ago