cover image
TENEX.AI

Cybersecurity Analyst

On site

Overland park, United states

Full Time

01-03-2026

Share this job:

Skills

Incident Response Monitoring Decision-making Machine Learning Analytics Data Science

Job Specifications

Company Summary: TENEX.AI is an AI-native, automation-first, built-for-scale Managed Detection and Response (MDR) provider. We are a force multiplier for defenders, helping organizations enhance their cybersecurity posture through advanced threat detection, rapid response, and continuous protection. Our team is comprised of industry experts with deep experience in cybersecurity, automation, and AI-driven solutions. We’re a fast growing startup backed by industry experts and top tier investor Andreessen Horowitz. As an early employee, you’ll play a meaningful role in defining and building our culture. Get in on the ground floor. We’re a small but well-funded team that just raised a substantial round – joining now comes with limited risk and unlimited upside. We are rapidly growing and seeking top talent to join our mission of revolutionizing the cybersecurity landscape.

Job Summary: We are seeking a highly skilled and proactive Cybersecurity Analyst to join our Security Operations Center (SOC) team. The ideal candidate will have a strong background in cybersecurity, coupled with experience in leveraging AI and machine learning (ML) technologies, particularly in the context of Google’s SecOps platform (e.g. Google Chronicle), to enhance the detection, analysis, and response to security incidents. This role is integral to safeguarding digital infrastructure, ensuring rapid detection of threats, and supporting continuous improvement of security processes.

Location: This role will require onsite in our Overland Park, KS location.

Position Type: Full-Time (either day or night shifts available)

Culture is one of the most important things at TENEX.AI—explore our culture deck at culture.tenex.ai to witness how we embody it, prioritizing the irreplaceable collaboration and community of in-person work.

This role is perfect for those already in Overland Park / Kansas City metro, or eager to relocate and commute here, where family-first visionaries build unbreakable cybersecurity empires. Ditch the crushing taxes and restrictions of high-cost states with our incredibly aggressive relocation packages, crafted to propel you and your loved ones into this thriving hub effortlessly and profitably—imagine lower taxes amplifying your success!

Immerse yourself in a pro-family stronghold with timeless Midwest values of integrity, hard work, and community, plus a balanced lifestyle that empowers you to dominate professionally while cherishing what matters most.

Key Responsibilities:

Threat Monitoring & Detection:
Monitor security alerts and events across the enterprise network, using both traditional cybersecurity tools and AI/ML-powered threat detection systems.
Perform triage, investigation, and correlation of security events to determine the severity and impact of potential threats.
Leverage Google Chronicle's capabilities for threat intelligence and log analysis, enhancing visibility and providing insights into potential security incidents.
Apply AI to identify patterns, anomalies, and behaviors indicative of potential security incidents, reducing false positives and improving detection accuracy.
Participate in on-call rotations for critical security incidents as needed.
Incident Response & Analysis:
Investigate and analyze security incidents and breaches, leveraging AI to automate initial analysis and enhance threat hunting efforts.
Respond to security incidents following established procedures, including containment, eradication, and recovery actions.
Conduct root cause analysis and forensic investigations to understand attack vectors and recommend mitigation strategies.
Utilize Google SecOps and Chronicle’s advanced tools to centralize security data, correlate events, and accelerate incident response workflows.
Apply machine learning algorithms to identify emerging threats and trends, providing actionable insights for incident response.
Google SecOps & Chronicle Integration:
Work with Google SecOps platform tools to streamline security operations, improve threat visibility, and automate workflows.
Collaborate with IT, Security, and Data Science teams to integrate Google Chronicle’s capabilities into the SOC, enhancing threat detection and incident resolution.
Optimize Google Chronicle for log management, threat hunting, and advanced analytics.
Security Automation:
Develop and maintain automated workflows for common security incidents, leveraging AI for intelligent decision-making and faster response times.
Automate routine SOC tasks such as log analysis, incident classification, and threat intelligence enrichment using Google SecOps and Chronicle integrations.
Reporting & Documentation:
Create detailed reports on incidents and threat intelligence summaries integrating AI-driven findings and insights.
Prepare regular performance and security posture reports for internal stakeholders, highlighting key AI-driven improvements and threat mitigation outcomes.
Generate and present reports on threat trends, and SOC operati

About the Company

TENEX is a cybersecurity company leveraging advanced artificial intelligence and human expertise to transform enterprise security. Backed by Andreessen Horowitz (a16z) and Shield Capital, TENEX's flagship offering is a next-generation Managed Detection and Response (MDR) service, transforming how organizations detect and respond to threats. With deep expertise in Google and Microsoft security ecosystems and state-of-the-art AI capabilities, TENEX empowers enterprises to enhance threat detection, agility, and resilience while... Know more