Logo
Tokio Marine HCC

IT Security Team Lead

Tokio Marine HCC, Houston, Texas, United States, 77246


IT Security Team Lead

Office Location: Houston, TXPosition Type: Full-Time

Tokio Marine HCC, a global power in the specialty insurance industry, is seeking a

Security Analyst Team Lead

with a passion to lead, defend, and make an impact in our Corporate IT group.

What we offer:

Competitive salary and employee benefit packageStrong learning cultureGrowth perspectives6% 401K match20 days of PTO and 2 Floating DaysPaid parental leaveAn opportunity to love what you doAbout TMHCC:

Tokio Marine HCC is the solution to a world that is changing at a pace not seen before. This is not traditional insurance - this is deeply technical and analytical business expertise that makes our clients businesses triumph over their competition. We provide support during unpredicted events, which means our clients' businesses progress at their desired pace. Our entire company structure is designed to empower our teams and individuals to guide our clients' critical decisions without bureaucracy and delay. TMHCC's parent company - Japan-based Tokio Marine Group - underpins and champions our growth innovation and steadfast commitment to our customers, while our flat and decentralized structure means every voice speaking on behalf of the customer is heard. And those voices are the best and brightest talent in the industry, working with the most innovative tools for collaboration, technology, and data. Our clients' success is the priority of every employee at TMHCC.

About the role:

The security team at TMHCC is seeking an experienced and enthusiastic subject matter expert and team lead. What you do here matters. Mentor junior analysts, assist in the development and deployment of both day-to-day and enterprise-wide strategic planning, and use your knowledge and experience to enhance our cybersecurity posture, mitigate risks, and safeguard our organization's assets.

Key Responsibilities:

Lead and coordinate incident response efforts, investigating and resolving security incident.Provide guidance and mentorship to junior team members, helping them develop their skills, navigate challenges, and grow into confident, capable professionals.Develop and refine SIEM correlation rules and alerts.Utilize PowerShell and Python scripting to automate repetitive tasks, streamline processes, and enhance efficiency within the SOC.Leverage regex patterns to parse and analyze log data for threat detection and correlation.Conduct proactive threat hunting activities.Collaborate with cross-functional teams in implementing security best practices and enhancing the overall security posture.Up to date on the latest cybersecurity trends, threats, and vulnerabilities.Skills and Experience:Essential :

5 or more years experience in a SOC environment, focusing on incident response and threat detection.Proficiency in SIEM platforms and experience tuning and optimizing SIEM rules and queries.Strong scripting skills in PowerShell and Python.In-depth knowledge of regex for log parsing and pattern matching.Experience with threat hunting methodologies and tools.Excellent analytical and critical thinking skills.Effective communication skills in mentoring, teaching, and explaining technical concepts to all stakeholders.Experience with cloud IR, logging, and detection.Desirable:

4 Year / bachelor's degree in relevant field (CS, Cybersecurity, etc.)Certifications like Sec+, GIAC, or equivalent are highly desirable.

#LI-TH1