Ro
Staff Incident Response Analyst
Job Summary
The role involves leading complex incident response engagements within a multi-cloud environment, including investigating adversary tactics and developing mitigation strategies. The position requires at least 7 years of experience in security operations or incident response, with hands-on expertise in cloud platforms such as AWS, Azure, or GCP. Candidates should be skilled in cyber investigations, threat analysis, and working with cross-functional teams to enhance security programs. The focus is on managing security incidents, shaping strategy, and leveraging analytical techniques to safeguard the organization’s infrastructure and data.
Required Skills
Benefits
Job Description
Ro is a direct-to-patient healthcare company with a mission of helping patients achieve their health goals by delivering the easiest, most effective care possible. Ro is the only company to offer nationwide telehealth, labs, and pharmacy services. This is enabled by Ro's vertically integrated platform that helps patients achieve their goals through a convenient, end-to-end healthcare experience spanning from diagnosis, to delivery of medication, to ongoing care. Since 2017, Ro has helped millions of patients in nearly every single county in the United States, including 98% of primary care deserts.
The healthcare system today is not designed to help patients achieve their goals. It’s designed around institutions such as hospitals and insurance companies. A patient centric healthcare system is one that is designed around the goals a patient wants to achieve. We’re building healthcare that puts patients in control, provides reactive and proactive care, has transparent pricing and process, is extremely effective and ridiculously convenient, and evolves over time based on patients’ goals.
Ro has been recognized as a Fortune Best Workplace in New York and Health Care for four consecutive years (2021-2024). In 2023, Ro was also named Best Workplace for Parents for the third year in a row. In 2022, Ro was listed as a CNBC Disruptor 50.
The Role
We are seeking a Staff Incident Response Analyst with demonstrable experience leading comprehensive incident response engagements, capable of developing innovative solutions to track and defend against sophisticated adversaries, and brings a broad vision and a deep understanding of the cybersecurity tradecraft.
Successful candidates will have successfully led complex incident response scenarios in a multi-cloud environment in the last 3 years. They will bring hands-on technical experience investigating adversary tactics, techniques, and procedures, and are fluent in interpreting complex events and anomalies as a seasoned security operations professional. The candidate will be comfortable navigating between strategic and task level discussions gracefully, collaborating with other cross-functional experts, and representing the SOC as our subject matter expert.
Preferred candidates will be assertive but open-minded critical thinkers with a high ownership mentality, understanding they own the goals and the outcomes. They’re comfortable displaying humility in an environment where it’s not about “being right”, rather we are all responsible for “getting it right”. They thrive working in challenging and hyper-modern, multi-cloud, SAAS-native environments with container-based first-party application architectures that are monitored with contemporary security controls.
- Serve as the SOC’s highest point of escalation for technical analysis and response, shape program strategy as a trusted individual contributor, and mentor analyst teammates toward improvement.
- Command incident response engagements as a hands-on cross-functional expert, leading both technical and non-technical colleagues, partners, and business leaders through complex scenarios.
- Impact threat management program strategy across multiple competency domains including external threat, insider threat, threat intelligence, data security, fraud management, and physical security.
- Work with stakeholders such as IT, Security Engineering, Product Security, Infrastructure, Privacy, and Legal teams to solve security challenges at scale, and enhance program capability.
- Discover unknown technical risks, correlate disparate data sources to acquire evidence, and apply superior analytical techniques in pursuit of proposing your recommended remediation strategy.
- Develop new hypotheses and perform detection engineering upon a rich dataset to discover adversary tactics, techniques and procedures aligned with our program’s threat intelligence.
- 7 years of experience in a security operations and incident response role, with a bachelor’s degree in a technical field or equivalent work experience.
- Real world experience in incident management, crisis management, and/or breach response with an in-depth knowledge of applying both manual and automated response procedures.
- Hands-on experience performing complex investigations and leading incident responses in AWS, Azure, or GCP environments, with experience interpreting and securing multi-cloud architectures.
- Seasoned SOC/CIRT operator fluent in cyber investigations, cloud native response, network/host intrusion analysis, with strong knowledge of adversary tactics, techniques, and procedures.
- Broad understanding of the risks facing the security industry, current and emerging threats, and varied approaches to applying modern controls in order to mitigate enterprise risks.
- Nice to have: certified GX-IH, GCIH, GCFR, GCSA, GCTD, GCFA, GWEB, AWS-Security or equivalents.
- Full medical, dental, and vision insurance + OneMedical membership
- Healthcare and Dependent Care FSA
- 401(k) with company match
- Flexible PTO
- Wellbeing + Learning & Growth reimbursements
- Paid parental leave + Fertility benefits
- Pet insurance
- Student loan refinancing
- Virtual resources for mindfulness, counseling, and fitness
The target base salary for this position ranges from $186,000 - $227,000 in addition to a competitive equity and benefits package (as applicable). When determining compensation, we analyze and carefully consider several factors, including location, job-related knowledge, skills and experience. These considerations may cause your compensation to vary.
Ro recognizes the power of in-person collaboration, while supporting the flexibility to work anywhere in the United States. For our Ro’ers in the tri-state (NY) area, you will join us at HQ on Tuesdays and Thursdays. For those outside of the tri-state area, you will be able to join in-person collaborations throughout the year (i.e., during team on-sites).
At Ro, we believe that our diverse perspectives are our biggest strengths — and that embracing them will create real change in healthcare. As an equal opportunity employer, we provide equal opportunity in all aspects of employment, including recruiting, hiring, compensation, training and promotion, termination, and any other terms and conditions of employment without regard to race, ethnicity, color, religion, sex, sexual orientation, gender identity, gender expression, familial status, age, disability and/or any other legally protected classification protected by federal, state, or local law.
See our California Privacy Policyhere.
Ro
Ro is a telehealth company connecting patients with US-licensed professionals entirely online. Get treatment now for weight loss, sexual health, hair loss, fertility, and more.
See more jobsSafe Remote Job Search Tips
Verify Employer Thoroughly
Research the company's identity thoroughly before applying. Check for a professional website with contacts, active social media, and LinkedIn profiles. Verify details across platforms and look for reviews on Glassdoor or Trustpilot to confirm legitimacy.
Never Pay to Get a Job
Legitimate employers never require payment for applications, training, background checks, or equipment. Always reject upfront payment requests or demands for bank details, even if they claim it's for purchasing necessary work gear on your behalf.
Safeguard Your Personal Information
Protect sensitive data like SSN, bank details, or ID copies. Share this only after accepting a formal, written job offer. Ensure it's submitted via a secure company system or portal, never through insecure channels like standard email attachments.
Scrutinize Communication & Interviews
Watch for communication red flags: poor grammar, generic emails (@gmail), vague details, or undue pressure. Be highly suspicious of interviews held only via text or chat apps; legitimate companies typically use video or phone calls.
Beware of Unrealistic Offers
If an offer's salary or benefits seem unrealistically high for the work involved, be cautious. Research standard pay for similar roles. Offers that appear 'too good to be true' are often scams designed to lure you into providing information or payment.
Insist on a Formal Contract
Always secure and review a formal, written job offer or employment contract before starting work or sharing final personal details. Ensure it clearly defines your role, compensation, key terms, and conditions to avoid misunderstandings or scams.