<Back to Search
Senior Security Analyst – Heartflow
Millbrae, CAMarch 31st, 2026
Senior Security Analyst – Heartflow Join to apply for theSenior Security Analyst – Heartflowrole atISC2 East Bay Chapter .Full TimeSan Francisco, CAPosted 1 day agoHeartflowis a medical technology company advancing the diagnosis and management of coronary artery disease, the #1 cause of death worldwide, using cutting‐edge technology. The flagship product—an AI‐driven, non‐invasive cardiac test supported by the ACC/AHA Chest Pain Guidelines called the Heartflow FFRCT Analysis—provides a color‐coded, 3D model of a patient's coronary arteries indicating the impact blockages have on blood flow to the heart. Heartflow is the first AI‐driven non‐invasive integrated heart care solution across the CCTA pathway that helps clinicians identify stenoses in the coronary arteries (RoadMapTMAnalysis), assess coronary blood flow (FFRCT Analysis), and characterize and quantify coronary atherosclerosis (Plaque Analysis). Our pipeline of products is growing and so is our team; join us in helping to revolutionize precision heartcare.Overview The Heartflow Information Security team is responsible for security across our corporate and product environments, protecting our patient data and medical device ecosystem. We are looking for an investigator that loves the challenge of analyzing complex security telemetry to uncover hidden threats and ensure a resilient defense for our corporate and product environments.The initial focus will be on triaging advanced security events and participating in our security incident response process. Analytical work will span our corporate, clinical and cloud infrastructure and will include threat hunting and the refinement of high‐fidelity detection logic.What You'll DoPerform in-depth analysis of security events, logs, and network traffic using SIEM, EDR, and other security tools to rapidly identify, contain, and remediate complex threats.Collaborate in developing and implementing custom correlation rules, dashboards, and alerts to enhance detection capabilities.Drive threat hunts to find "quiet" persistent threats within our clinical and corporate environments.Participate in continuous refinement of incident response playbooks, operational procedures, and security standards.Perform security reviews of third‐party vendors to identify risks and ensure they meet company standards.What You BringEducation– BS in Computer Science or a related technical degree. No degree? No problem—if you have the equivalent experience and certifications, we want to hear from you.Experience– At least 2 years in the trenches of a SOC or Incident Response team. However, if you haven't held a formal "Security" title but have at least 2 years on an IT Operations team, we value deep technical expertise in operating systems and networking if you can show us your passion for security.Comfortable navigating security platforms like SIEMs, EDR tools (CrowdStrike or similar), and Email Security platforms.Strong problem‐solving skills with the ability to troubleshoot security issues across networks, operating systems, and applications.Possess a solid understanding of log correlation and how to write logic for security alerts.Deep understanding of at least one of the operating system internals (Windows, Linux, or macOS). Ability to analyze process trees.Able to analyze network flows and packet data to find hidden threats. You know your way around network tools and can spot anomalies across different types of environments.What Helps You Stand OutCertifications: SANS GIAC (GCIH, GCIA), CompTIA (Security+, CySA+), EC‐Council (C|SA) or equivalent.Proven ability to take initiative—track record of identifying problems and developing solutions independently.Excellent written and verbal communication skills, with the ability to clearly articulate complex technical issues and remediation plans to both technical and non‐technical audiences.You are a continuous learner who stays curious about the latest attack trends and loves figuring out how to stop them.A reasonable estimate of the base salary compensation range is $75,000 to $100,000 per year, and bonus.Seniority levelMid‐Senior levelEmployment typeFull‐timeJob functionInformation TechnologyIndustriesComputer and Network SecurityHeartflow is an Equal Opportunity Employer. We are committed to a work environment that supports, inspires, and respects all individuals and do not discriminate against any employee or applicant because of race, color, religion, marital status, age, national origin, ancestry, physical or mental disability, medical condition, pregnancy, genetic information, gender, sexual orientation, gender identity or expression, veteran status, or any other status protected under federal, state, or local law. This policy applies to every aspect of employment at Heartflow, including recruitment, hiring, training, relocation, promotion, and termination.Positions posted for Heartflow are not intended for or open to third‐party recruiters / agencies. Submission of any unsolicited resumes for these positions will be considered to be free referrals.Heartflow has become aware of a fraud where unknown entities are posing as Heartflow recruiters in an attempt to obtain personal information from individuals as part of our application or job offer process. Before providing any personal information to outside parties, please verify the following: A) all legitimate Heartflow recruiter email addresses end with "@heartflow.com" and B) the position described is found on our careers site at www.heartflow.com/about/careers/.To apply for this job please visit job-boards.greenhouse.io.#J-18808-Ljbffr
Showing all 12,257 matching similar jobs
- Senior Security Analyst – Heartflow Heartflow
- Security Engineer, Insider Threat Detection & Response
- Staff Security Specialist, Threat Hunter
- Security Specialist
- Cyber Threat Intelligence Analyst
- Staff Security Specialist, Threat Hunter
- Cyber Intel Threat Analyst - Clearance Required
- Language Enabled Cyber Threat Analyst - Mandarin Chinese
- Cyber Security Specialist
- IT Cybersecurity Analyst - Vulnerability Management Cyber Security Engineer
- Staff Security Specialist, Threat Hunter
- Staff Security Specialist, Threat Hunter
- Graduate Cyber Security Analyst (Cyber Academy)
- Graduate Cyber Security Analyst (Cyber Academy)
- Remote Threat Research Engineer Crimeware & RansomwareMillbrae, CAMarch 20th, 2026
- Security Engineer, Insider Threat Detection & Response
- AI Security Analyst — Remote & Flexible HoursRemoteMarch 31st, 2026
- Remote Information Security Analyst - Threat DetectionRemoteMarch 26th, 2026
- Senior Cybersecurity Threat Hunter (Remote Contract)RemoteMarch 31st, 2026
- Remote AI Red-Teamer: Cybersecurity Risk Analyst
- Busser - Red River Chili'sGainesville, TXMarch 20th, 2026
- Remote AI Security Researcher - Red Team Specialist
- Remote AI Security Analyst | Forensics & Threat ModelingRemoteMarch 31st, 2026
- Remote AI Security Evaluator – Red Team ExpertRemoteMarch 31st, 2026
- Senior Cyber Threat Intelligence Analyst (Hybrid)
- Graduate Cyber Security Analyst (Cyber Academy)
- ISSO: Strategic Cyber Risk & Cloud Security Lead
- Director, Insider Threat
- Cyber Network Analyst - DoD/SCI Security Specialist
- Sr Security Engineer SSO (PingFederate)
- Active Defense & Threat Hunting Analyst (Hybrid)
- Cyber Threat Analyst - Space & National Security
- Remote AI Security Evaluator & Threat Analyst
- Senior Red Team Operator - Cyber Threat Emulation (TS/SCI)
- Threat and Exposure Management Lead
- Operational Technology (OT) Security Engineer
- Engineer, Endpoint Security
- Exploitation Analyst 4
- AI & SS Master (Vulnerability/System Engineer)
- Exploitation Analyst 3