Posted 14 Feb 2026, 0:04 am
Information Security Operations Engineer at Bounteous
Bounteous is a premier end-to-end digital transformation consultancy dedicated to partnering with ambitious brands to create digital solutions for today’s complex challenges and tomorrow’s opportunities. With uncompromising standards for technical and domain expertise, we deliver innovative and strategic solutions in Strategy, Analytics, Digital Engineering, Cloud, Data & AI, Experience Design, and Marketing.
Our Co-Innovation methodology is a unique engagement model designed to align interests and accelerate value creation. Our clients worldwide benefit from the skills and expertise of over 4,000+ expert team members across the Americas, APAC, and EMEA. By partnering with leading technology providers, we craft transformative digital experiences that enhance customer engagement and drive business success.
\n- Promote and enforce awareness of key information security practices, including acceptable use of information assets, malware protection, and password security protocols
- Identify, assess, and report security risks, focusing on how these risks impact the confidentiality, integrity, and availability of information assets
- Understand and evaluate how data is stored, processed, or transmitted, ensuring compliance with data privacy and protection standards (GDPR, CCPA, etc.)
- Ensure data protection measures are integrated throughout the information lifecycle to safeguard sensitive information
- Information Security Operations Engineer is a member of the Gen Re Security team, who will leverage extensive
- The candidate shall work closely with Security and other IT practice leads to ensure that detection logic, incident
- The candidate must have a strong background in technology, security and metrics, and must be highly adaptive.
- The candidate must be highly organized and analytical and is expected to partner and mentor effectively with other teams on an ongoing basis.
- Refine detection logic and improve alert fidelity across platforms such as CrowdStrike, Taegis, and
- Enhance incident response workflows and update runbooks to reflect current tooling and evolving
- Perform gap analysis and coverage mapping to ensure security data quality, log integrity, and timestamp
- Implement security automation and orchestration to reduce manual effort and improve operational
- Conduct reviews of alerts and enforce effective timely incident investigation.
- Formalize collaboration between offensive and defensive security teams to integrate findings into
- Monitor and optimize SIEM telemetry to improve detection capabilities and reduce false positives.
- Lead threat hunting initiatives and proactively identify indicators of compromise across enterprise
- Perform end-to-end security incident response, including triage, containment, eradication, recovery, and
- Monitor and assess AI-driven tooling and platforms to ensure compliance with governance policies,
- Proficiency with SIEM, EDR, and Infrastructure as a Service.
- 5+ years of IT Support experience focusing on IT Security and Security Operations.
- Outstanding communication (verbal, written, and listening) and customer service skills.
- Familiarity with IT security controls, protocols, and best practices.
- Ability to interact with all levels of management.
- Self-starter with the ability to work independently and in a team setting.
- It is the continuing policy of General Re Corporation to afford equal employment opportunity to qualified individuals regardless of their race, color, religion, sex, sexual orientation, national origin, age, marital status, disability or citizenship and to conform to applicable laws and regulations.
- A Berkshire Hathaway Company
- High level of accountability, integrity, and dependability.
- Excellent attention to detail.
- Strong time, project, and people management abilities.
- Experience developing and enforcing AI governance frameworks and monitoring AI-driven tools for compliance with regulatory and organizational standards.
- Bachelor’s or master’s degree in computer science, information systems or other related field, or
- Professional security management certification, such as ISC(2) Certified Information Systems
- Security Professional (CISSP), SANS GIAC Information Security Professional (GI)
We invite you to stay connected with us by subscribing to our monthly job openings alert here.
Bounteous is proud to be an equal opportunity employer. Bounteous does not discriminate on the basis of race, religion, color, sex, gender identity, sexual orientation, age, physical or mental disability, national origin, veteran status, or any other status protected under federal, state, or local law. Bounteous is willing to sponsor eligible candidates for employment visas.
#BI-Remote
#LI-Remote
Please mention the word **GODLIKE** and tag ROTQuMTU2LjEzMS40Nw== when applying to show you read the job post completely (#ROTQuMTU2LjEzMS40Nw==). This is a beta feature to avoid spam applicants. Companies can search these words to find applicants that read this and see they're human.
The offering company is responsible for the content on this page / the job offer.
Source: Remote Ok