Job Description
Gong harnesses the power of AI to transform how revenue teams win. The Gong Revenue AI Operating System unifies data, insights, and workflows into a single, trusted system that observes, guides, and acts alongside the world’s most successful revenue teams. Powered by the Gong Revenue Graph, AI-powered intelligence, specialized agents, and trusted applications, Gong helps more than 5,000 companies around the world deeply understand their teams and customers, automate critical sales workflows, and close more deals with less effort. For more information, visit www.gong.io.
At Gong, you will join a company built on innovative products, ambitious goals, and passionate people. We are shaping the future of revenue intelligence and we want people who are excited to build what comes next. You will work with a team that dreams big, moves fast, and cares deeply about the craft and about each other. Here, transparency and trust are core to how we operate, and every person has the opportunity to make a visible impact. If you want to grow, stretch, and do work that truly matters, Gong is the place to do the best work of your career.
Bad actors are evolving, but we’re building the future. We aren't looking for a dashboard-watcher; we’re looking for a Digital Bodyguard who dreams in binary and hunts threats for breakfast. As our Senior Security Operations Analyst, you are the MVP of our Cyber Defense team—the person who keeps our global infrastructure ironclad while the rest of the world sleeps soundly.
If you’re a cloud-savvy defender who thrives when the stakes are high and hates manual toil, your new playground is ready.
What You’ll Actually Do:
Be the Incident Commander: When the alarm bells ring, you’re the calmest person in the room. You’ll lead high-stakes response efforts from the first "ping" to the final "mission accomplished."
Go Rogue (The Good Way): Forget waiting for alerts. You’ll lead proactive hunting expeditions, sniffing out IoCs and behavioral anomalies before they ever make it to a headline.
Build Your Robot Army: You have a healthy obsession with efficiency. You’ll architect SOAR workflows and security automation to kill the manual grind, letting your team focus on the big-brain puzzles.
Master the Multi-Cloud: AWS, GCP, Azure—you’re the gatekeeper of our cloud kingdom, ensuring our posture is tighter than a drum across every environment.
The Elite Mentor: You’re the leader the pack looks to. You’ll level up our junior analysts and set the gold standard during on-call rotations.
The Cross-Functional Diplomat: You’ll bridge the gap between IT, Legal, and Privacy, closing security gaps and making sure the entire org is as resilient as the tech they use.
Total Autonomy: We don't micromanage; we empower. You see a gap? You fix it. You see a process to automate? You build it.
Tech Stack Paradise: From EDR tuning to MDM strategy, you’ll have your hands on the best tools in the business.
Required Qualification:
4+ years of experience in any of the following areas:
Security Incident Response
SIEM
Cybersecurity threat detection, monitoring, and reporting
Cyber Intelligence and Threat Hunting
Vulnerability Management
Proficiency with EDR/XDR (CrowdStrike, SentinelOne, MS Defender), Cloud Security Posture Management (Wiz, Prisma Cloud, Orca), and WAFs (Cloudflare, Akamai).
Actively participated in Purple Team Exercises and Tabletop exercises, and applied necessary security controls
Strong analytical and problem-solving skills.
Excellent communication and teamwork abilities.
Preferred Qualifications:
Security certifications like Security+, GCIH, GCFE, GCFA, AWS Certified Cloud Practioner or similar are a plus.
Familiarity with attack frameworks (MITRE ATTCK) and mitigation strategies.
Design and implement automated workflows using SOAR tools (e.g., Tines, Cortex XSOAR) to streamline repetitive tasks
Scripting ability (PowerShell, Python) and familiarity with Query Languages (KQL, SQL, SPL) for automation ... (truncated, view full listing at source)