Posted:
5/12/2026, 2:53:29 PM
Experience Level(s):
Junior ⋅ Mid Level ⋅ Senior
Field(s):
Consulting
Workplace Type:
Hybrid
Job Title:
Solution ConsultantAbout Trellix
Trellix is a global company redefining the future of cybersecurity. The company’s comprehensive, open, and native cybersecurity platform helps organizations confronted by today’s most advanced threats gain confidence in the protection and resilience of their operations. Trellix, along with an extensive partner ecosystem, accelerates technology innovation through artificial intelligence, automation, and analytics to empower over 50,000 business and government customers with responsibly architected security. More at https://trellix.com.
Role Overview:
As outlined belowAbout the Role
Develops and delivers detailed IT solutions through consulting project activities.
Responsibilities include client identification through final invoicing for engagements requiring varied interpersonal and technical skills.
Technical responsibilities include problem identification, system architecture definition, hardware/software specification and/or design, implementation, testing, client training, and solution deployment.
Performance is typically evaluated based on utilization (i.e., billable hours). Project management activities include interaction with company and client managers and cost/schedule monitoring.
May have some financial responsibilities, including project cost estimating, proposal generation, and invoicing.
May participate in sales and proposal presentations in addition to completing ongoing team account activities. Identifies additional product/service opportunities in the customer organization.
Performance is typically measured by the capture of the consulting engagement and/or delivery of agreed solutions within budgeted hours.
About You
Understanding of cyber threats, attack vectors, detection capabilities, and associated countermeasures
Experience working in a Security Operations Center to monitor security alerts, respond to, and remediate detected issues is preferred
Clear understanding of organizational Incident Management processes in relation to threats and vulnerabilities
Maintain a deep knowledge of Trellix (formerly McAfee) Endpoint Security, Application Control/Change Control, ENS, TIE, DXL, DLP.
Experience in Windows, Mac, Linux OS and application hardening, including understanding artifacts and behaviors.
Experience with one or more scripting languages: Python, PowerShell, Go, C#, other command line scripting or similar is preferred.
You may have experience scripting API integrations with response and orchestration tools like SIEM, SOARs and/or XDR platforms
Experience with a SIEM tool and working with SIEM Analyst.
Experience with event correlation and analysis.
Demonstrated technical proficiency in cybersecurity operations, cybersecurity engineering, systems engineering
Experience with Virtualization (VMWare, Nutanix, etc.) and Cloud Services [i.e., AWS, Azure]) and enterprise networks.
Deliver onsite and remote security application/endpoint protection designs, implementations, training, and knowledge transfer for a wide variety of customers.
Be able to identify gaps in application and network security architecture and recommend strategies using a combination of industry-standard security best practices, software controls and other necessary changes to promote a higher level of information security practices.
Author formal reports, architecture designs, optimization guides, and best-practice white papers covering a variety of security topics.
Participate in conference calls, onsite meetings and roundtables with customers, sales, internal product development and support to gather data, scope new and existing work, evaluate or suggest new product features and assist in resolving existing product issues.
Recognize and generate potential product and consulting services sales leads when appropriate and necessary
Experience with configuration of debugging, event generation, and logging functionality within the application and operating systems, using Syslog or flat-file generation.
Company Benefits and Perks:
We believe that the best solutions are developed by teams who embrace each other's unique experiences, skills, and abilities. We work hard to create a dynamic workforce where we encourage everyone to bring their authentic selves to work every day. We offer a variety of social programs, flexible work hours and family-friendly benefits to all of our employees.
Retirement Plans
Medical, Dental and Vision Coverage
Paid Time Off
Paid Parental Leave
Support for Community Involvement
We're serious about our commitment to a workplace where everyone can thrive and contribute to our industry-leading products and customer support, which is why we prohibit discrimination and harassment based on race, color, religion, gender, national origin, age, disability, veteran status, marital status, pregnancy, gender expression or identity, sexual orientation or any other legally protected status.
Our Commitment to You:
At Trellix, we are committed to creating a safe and trustworthy experience for our customers, employees, and candidates. Please be aware that fraudulent recruiting activity can occur through fake job postings or impersonated communications.
Trellix conducts interviews through professional channels only and does not use text messages, instant messaging, or group chats for interviews. We will never request sensitive personal information—such as your date of birth, Social Security number, or national ID number—during the interview process.
Trellix also does not require candidates to pay fees, purchase products or services, or process payments of any kind as part of the recruiting or hiring process. And Trellix will never keep any original work authorization documents that we may be required to review during the hiring process.
Website: https://trellix.com/
Headquarter Location: San Francisco, California, United States
Employee Count: 1001-5000
Year Founded: 2022
IPO Status: Private
Last Funding Type: Venture - Series Unknown
Industries: Cyber Security ⋅ Information Technology ⋅ Network Security