Overview
On Site
Depends on Experience
Accepts corp to corp applications
Contract - Independent
Contract - W2
Contract - 12 Month(s)
Skills
Cyber Security
Cloud Computing
SOC Analysis
SIEM
EDR
threat hunting
cyber threat intelligence
MITRE ATT&CK
SIEM platforms
email protection
Job Details
Title: Cyber Security Analyst
Location: Woburn, MA
Technical - SOC Analysis, cybersecurity
Interview Process: 2 ROUNDS 1st via teams and 2nd will be onsite
Hours / Shift (if applicable): 8AM-5PM are the core hours
Key Responsibilities:
- Collaborate with a senior cybersecurity specialist to conduct proactive threat hunting across endpoints, networks, and cloud environments.
- Analyze security data from SIEM, EDR, and other telemetry sources to identify anomalies and potential threats.
- Analyze network traffic, endpoint telemetry, and log data to identify indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs).
- Develop and fine-tune detection rules, alerts, and dashboards to improve visibility and response times.
- Perform deep-dive investigations into suspicious activity and provide detailed analysis and reporting.
- Collaborate with threat intelligence teams to correlate internal findings with external threat data.
- Participate in the development of threat hunting playbooks and contribute to continuous improvement of detection methodologies.
- Assist in the creation of reports and presentations to communicate findings to technical and non-technical stakeholders.
- Support vulnerability management efforts by identifying and tracking remediation of security gaps.
- Stay current with emerging threats, attack techniques, and cybersecurity trends.
Required Qualifications:
- Bachelor s degree in Cybersecurity, Computer Science, Information Security, or related field.
- 3+ years of experience in threat hunting, SOC analysis, or cyber threat intelligence.
- Strong understanding of MITRE ATT&CK framework, kill chain models, and adversary emulation.
- Experience with SIEM platforms (e.g., CrowdStrike, Sentinel, QRadar) and EDR tools (e.g., CrowdStrike, Defender).
- Experience with email protection systems (e.g., Mimecast, Defender, Purview)
- Strong analytical skills and the ability to interpret large datasets to identify patterns and anomalies.
- Basic scripting knowledge (e.g., Python, PowerShell) for automation and data parsing.
- Excellent analytical, investigative, and communication skills.
Preferred Certifications:
- CompTIA Security+ or CySA+
- GIAC Security Essentials (GSEC)
- Certified SOC Analyst (CSA)
- Microsoft SC-200 (Security Operations Analyst Associate)
Preferred:
- Basic scripting knowledge Familiarity with Python, PowerShell, or similar for automation and data parsing.
- Experience with email protection systems Such as Mimecast, Defender, or Purview.
- Collaboration and communication skills Ability to work with threat intelligence teams and communicate findings to both technical and non-technical stakeholders.
- Continuous learning mindset Staying current with emerging threats, attack techniques, and cybersecurity trends.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.