Senior Security Analyst
Heartflow is a medical technology company advancing the diagnosis and management of coronary artery disease, the #1 cause of death worldwide, using cutting-edge technology. The flagship product—an AI-driven, non-invasive cardiac test supported by the ACC/AHA Chest Pain Guidelines called the Heartflow FFRCT Analysis—provides a color-coded, 3D model of a patient’s coronary arteries indicating the impact blockages have on blood flow to the heart. Heartflow is the first AI-driven non-invasive integrated heart care solution across the CCTA pathway that helps clinicians identify stenoses in the coronary arteries (RoadMap™Analysis), assess coronary blood flow (FFRCT Analysis), and characterize and quantify coronary atherosclerosis (Plaque Analysis). Our pipeline of products is growing and so is our team; join us in helping to revolutionize precision heartcare.
Heartflow is a publicly traded company (HTFL) that has received international recognition for exceptional strides in healthcare innovation, is supported by medical societies around the world, cleared for use in the US, UK, Europe, Japan and Canada, and has been used for more than 500,000 patients worldwide.
Overview
The Heartflow Information Security team is responsible for security across our corporate and product environments, protecting our patient data and medical device ecosystem. We are looking for an investigator that loves the challenge of analyzing complex security telemetry to uncover hidden threats and ensure a resilient defense for our corporate and product environments.
The initial focus will be on triaging advanced security events and participating in our security incident response process. Analytical work will span our corporate, clinical and cloud infrastructure and will include threat hunting and the refinement of high-fidelity detection logic.
What You’ll Do:
- Perform in-depth analysis of security events, logs, and network traffic using SIEM, EDR, and other security tools to rapidly identify, contain, and remediate complex threats.
- Collaborate in developing and implementing custom correlation rules, dashboards, and alerts to enhance detection capabilities.
- Drive threat hunts to find "quiet" persistent threats within our clinical and corporate environments.
- Participate in continuous refinement of incident response playbooks, operational procedures, and security standards.
- Perform security reviews of third-party vendors to identify risks and ensure they meet company standards.
What You Bring:
- Education - BS in Computer Science or a related technical degree. No degree? No problem—if you have the equivalent experience and certifications, we want to hear from you.
- Experience - At least 2 years in the trenches of a SOC or Incident Response team. However, if you haven't held a formal "Security" title but have at least 2 years on an IT Operations team, we value deep technical expertise in operating systems and networking if you can show us your passion for security.
- You’re comfortable navigating security platforms like SIEMs, EDR tools (CrowdStrike or similar), and Email Security platforms.
- Strong problem-solving skills with the ability to troubleshoot security issues across networks, operating systems, and applications.
- Possess a solid understanding of log correlation and how to write logic for security alerts.
- Deep understanding of at least one of the operating system internals (Windows, Linux, or macOS). Ability to analyze process trees.
- Able to analyze network flows and packet data to find hidden threats. You know your way around network tools and can spot anomalies across different types of environments.
What Helps You Stand Out:
- Certifications: SANS GIAC (GCIH, GCIA),CompTIA (Security+, CySA+), EC-Council (C|SA) or equivalent
- Proven ability to take initiative— track record of identifying problems and developing solutions independently.
- Excellent written and verbal communication skills, with the ability to clearly articulate complex technical issues and remediation plans to both technical and non-technical audiences.
- You are a continuous learner who stays curious about the latest attack trends and loves figuring out how to stop them.
A reasonable estimate of the base salary compensation range is $75,000 to $100,000 per year, and bonus. #LI-IB1
Create a Job Alert
Interested in building your career at Heartflow? Get future opportunities sent straight to your email.
Apply for this job
*
indicates a required field
