Overview
On Site
Contract - W2
Contract - 6+ Month(s)
Skills
Powershell
Python
SIEM
EDR
Cyber Security Analyst
cybersecurity specialist
Analyze security data from SIEM
and other teleme
Job Details
Job Title :Cyber Security Analyst
Duration : 6 Month+
Location : Woburn, MA (Onsite)
Duration : 6 Month+
Location : Woburn, MA (Onsite)
Seeking a detail-oriented and proactive Cyber Security Analyst to join our First Line of Defense (1LoD) team. In this role, you will work closely with a senior cybersecurity specialist, contributing to a collaborative and knowledge-rich environment. Your primary responsibilities will include threat hunting, data analysis, and early detection of cyber threats to identify patterns, uncover hidden threats, and improve our overall security posture to protect the organization's digital assets.
Key Responsibilities:
-Collaborate with a senior cybersecurity specialist to conduct proactive threat hunting across endpoints, networks, and cloud environments.
-Analyze security data from SIEM, EDR, and other telemetry sources to identify anomalies and potential threats.
-Analyze network traffic, endpoint telemetry, and log data to identify indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs).
-Develop and fine-tune detection rules, alerts, and dashboards to improve visibility and response times.
-Perform deep-dive investigations into suspicious activity and provide detailed analysis and reporting.
-Collaborate with threat intelligence teams to correlate internal findings with external threat data.
-Participate in the development of threat hunting playbooks and contribute to continuous improvement of detection methodologies.
-Assist in the creation of reports and presentations to communicate findings to technical and non-technical stakeholders.
-Support vulnerability management efforts by identifying and tracking remediation of security gaps.
-Stay current with emerging threats, attack techniques, and cybersecurity trends.
Required Qualifications:
-Bachelor's degree in Cybersecurity, Computer Science, Information Security, or related field.
-3+ years of experience in threat hunting, SOC analysis, or cyber threat intelligence.
-Strong understanding of MITRE ATT&CK framework, kill chain models, and adversary emulation.
-Experience with SIEM platforms (e.g., CrowdStrike, Sentinel, QRadar) and EDR tools (e.g., CrowdStrike, Defender).
-Experience with email protection systems (e.g., Mimecast, Defender, Purview)
-Strong analytical skills and the ability to interpret large datasets to identify patterns and anomalies.
-Basic scripting knowledge (e.g., Python, PowerShell) for automation and data parsing.
-Excellent analytical, investigative, and communication skills.
Preferred Certifications:
-CompTIA Security+ or CySA+
-GIAC Security Essentials (GSEC)
-Certified SOC Analyst (CSA)
-Microsoft SC-200 (Security Operations Analyst Associate)
Key Responsibilities:
-Collaborate with a senior cybersecurity specialist to conduct proactive threat hunting across endpoints, networks, and cloud environments.
-Analyze security data from SIEM, EDR, and other telemetry sources to identify anomalies and potential threats.
-Analyze network traffic, endpoint telemetry, and log data to identify indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs).
-Develop and fine-tune detection rules, alerts, and dashboards to improve visibility and response times.
-Perform deep-dive investigations into suspicious activity and provide detailed analysis and reporting.
-Collaborate with threat intelligence teams to correlate internal findings with external threat data.
-Participate in the development of threat hunting playbooks and contribute to continuous improvement of detection methodologies.
-Assist in the creation of reports and presentations to communicate findings to technical and non-technical stakeholders.
-Support vulnerability management efforts by identifying and tracking remediation of security gaps.
-Stay current with emerging threats, attack techniques, and cybersecurity trends.
Required Qualifications:
-Bachelor's degree in Cybersecurity, Computer Science, Information Security, or related field.
-3+ years of experience in threat hunting, SOC analysis, or cyber threat intelligence.
-Strong understanding of MITRE ATT&CK framework, kill chain models, and adversary emulation.
-Experience with SIEM platforms (e.g., CrowdStrike, Sentinel, QRadar) and EDR tools (e.g., CrowdStrike, Defender).
-Experience with email protection systems (e.g., Mimecast, Defender, Purview)
-Strong analytical skills and the ability to interpret large datasets to identify patterns and anomalies.
-Basic scripting knowledge (e.g., Python, PowerShell) for automation and data parsing.
-Excellent analytical, investigative, and communication skills.
Preferred Certifications:
-CompTIA Security+ or CySA+
-GIAC Security Essentials (GSEC)
-Certified SOC Analyst (CSA)
-Microsoft SC-200 (Security Operations Analyst Associate)
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.