Security Analyst responsible for analyzing and responding to escalated alerts, conducting investigations, and providing technical guidance to Tier 1 analysts. Key responsibilities include malware analysis, log correlation, and network traffic analysis, as well as supporting proactive threat hunting initiatives and maintaining documentation of investigations and incident outcomes.
Requirements
- Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or related field—or equivalent work experience.
- 2–4 years of experience in a Security Operations Center or similar cybersecurity environment.
- Experience working in an MSSP or multi-tenant environment is highly desirable.
- Strong experience with SIEM platforms (e.g., Splunk, Sentinel, QRadar).
- Hands-on experience with EDR tools (e.g., CrowdStrike, SentinelOne, Microsoft Defender).
- Familiarity with NDR and SOAR platforms is a plus (e.g., Darktrace, Corelight, Cortex XSOAR).
- Strong understanding of networking protocols, log analysis, and system administration (Windows/Linux).
- Knowledge of malware behaviors, phishing techniques, and MITRE ATT&CK framework.
- Experience with scripting and automation tools (e.g., Python, PowerShell) is a plus.
- Familiarity with case management tools (e.g., Jira, ServiceNow, TheHive).
- Certifications (preferred): CompTIA Security+, CySA+, or equivalent, GIAC certifications (e.g., GCIH, GCIA, GCFA), CEH, or vendor-specific certifications (e.g., Microsoft SC-200, CrowdStrike CCFR).
Benefits
- Competitive salary
- Benefits package
- Opportunities for professional growth and development