Senior Security Analyst
Quick Summary
Lead is a fintech building banking infrastructure for embedded financial products and services. We operate an FDIC-insured bank headquartered in Kansas City, Missouri.
Detection as Code experience using version-controlled detection content Exposure to identity security tooling
Lead is a fintech building banking infrastructure for embedded financial products and services. We operate an FDIC-insured bank headquartered in Kansas City, Missouri. Additionally, we have offices in San Francisco, Sunnyvale, and New York City, where our technical, product, design, and legal teams operate.
We are built for a constantly evolving financial landscape, where new ventures and technological advancements emerge daily. Guided by a team of entrepreneurs and technologists with decades of experience navigating intricate banking and payments regulations, Lead blends regulatory and technological expertise to help our fintech partners scale their operations with compliance and creativity.
Simply put, Lead offers the essential attributes that every fintech seeks in a partner bank. First, unparalleled technical expertise from a distinguished team of developers with an extensive understanding of the banking and payments systems. Second, oversight expertise, automated compliance systems, and bespoke program management to navigate the ever-shifting regulatory landscape. Finally, a commitment to transparency and operational rigor to ensure everyone’s money does what it’s supposed to do.
Lead Bank is looking for a Senior Security Analyst to join our Security Operations team. You'll be a core contributor to our detection and response capabilities — building detections, triaging alerts, responding to incidents, and proactively hunting threats across cloud infrastructure, security tooling, and data pipelines. You'll mentor junior analysts and partner with leadership to drive our security posture forward. Your expertise will be vital in navigating the complex regulatory landscape of the banking industry and defending against advanced persistent threats.
Build, tune, and maintain detection rules and alerts in our SIEM, writing queries to identify threats and coverage gaps aligned to MITRE ATT&CK
Own incident response execution end-to-end — containment, eradication, recovery, and lessons learned — including forensic log analysis and post-incident reporting
Monitor and investigate security events across endpoints, cloud (AWS), identity, and network telemetry — identifying misconfigurations, anomalous activity, and suspicious behavior
Assist with security audits and regulatory examinations, ensuring timely and accurate security documentation and evidence is provided
Analyze systems, applications, and networks for security configurations in partnership with security engineers.
Manage log pipelines including ingestion, parsing, normalization, and enrichment to ensure high-fidelity data is available for detection and investigation
Triage and prioritize vulnerability findings using risk-based frameworks and track remediation SLAs with IT and Engineering
Collaborate with Engineering on IaC and CI/CD security reviews, and contribute to runbooks and playbooks
Perform all other duties as assigned
Required
5+ years in information security or security operations
Hands-on SIEM experience with query writing, detection building, and alert tuning
Strong working knowledge of cloud security concepts and services (AWS preferred; GCP and Azure also considered)
Proficiency working with logs across endpoint, cloud, network, identity, and application sources
Understanding of CI/CD pipelines and IaC (Terraform, CloudFormation) from a security perspective
Solid grasp of Windows, macOS, and Linux internals — processes, persistence mechanisms, and attacker TTPs
Demonstrated IR experience, including leading or contributing to investigations
Familiarity with data normalization, log parsing, and ETL concepts
Strong written and verbal communication skills
Preferred
Experience with log routing, transformation, and enrichment
Hands-on experience with an enterprise EDR/XDR platform and its ecosystem tooling — SOAR, exposure management, and identity protection
Experience with network security tools and interpreting proxy or web traffic logs Background in a regulated industry (financial services, healthcare) with familiarity with NIST CSF, GLBA, or FFIEC
Scripting or automation experience (Python, Bash) for detection engineering, workflow automation, and version-controlled code in GitHub
Relevant certifications: CISSP, GCIH, GCIA, GCED, CEH, GDSA, or equivalent
Nice to Have
Detection as Code experience using version-controlled detection content
Exposure to identity security tooling
What We Offer
~1 min readLocation & Eligibility
Listing Details
- Posted
- April 23, 2026
- First seen
- May 8, 2026
- Last seen
- May 8, 2026
Posting Health
- Days active
- 0
- Repost count
- 0
- Trust Level
- 20%
- Scored at
- May 8, 2026
Signal breakdown
Please let leadbank know you found this job on Jobera.
3 other jobs at leadbank
View all →Explore open roles at leadbank.
Similar Security Analyst jobs
View all →Browse Similar Jobs
Stay ahead of the market
Get the latest job openings, salary trends, and hiring insights delivered to your inbox every week.
No spam. Unsubscribe at any time.