Overview
Skills
Job Details
Need - Principal / Lead Cybersecurity Analyst who can work on W2
Location: Greensboro, NC (Hybrid, 2-3x per week)
Monday-Friday - 2pm -10pm ESt ( Shift timing )
Need - / L2/ / USC
As a Principal Cybersecurity Analyst , you will be a senior technical leader within the Global Cybersecurity Operations Center ( CSOC ). This role combines expert - level hands - on incident response, advanced threat hunting, & digital forensics with strategic cybersecurity leadership.
Need to play a critical role in shaping CSOC strategy, working alongside the Head of CSOC to refine detection, response, & intelligence capabilities to proactively defend against emerging threats. As a recognized subject matter expert ( SME ), you are expected to stay ahead of cyber threat trends, attack methodologies, & adversary tactics, ensuring the CSOC is future - ready & resilient against evolving cyber threats.
Minimum Qualifications:
Education & Experience
Bachelor s or Master s degree in Cybersecurity, Computer Science, or a related field.
10+ years of hands - on cybersecurity experience, with deep expertise in SOC operations, incident response, & cyber threat intelligence.
Demonstrated experience leading complex investigations into APTs, cybercrime operations, & enterprise - wide security incidents.
Technical Skills & Expertise
Advanced Incident Response & Forensics:
Expert-level proficiency in digital forensics, memory analysis, network forensics, & endpoint telemetry analysis.
Ability to track adversary TTPs across enterprise environments using advanced threat intelligence correlation
Hands-on experience with industry - leading SIEM, EDR, IDS / IPS, forensic tools, & threat intelligence platforms.
Proficiency in YARA rule development, Sigma rules, & custom detection engineering.
Expert understanding of nation-state cyber threats, APT campaigns, & cybercriminal ecosystems.
Strong working knowledge of MITRE ATT & CK, Diamond Model, Cyber Kill Chain, & TIBER - EU methodologies.
Ability to reverse engineer malware & extract indicators of compromise ( IOCs ) & tactics of adversaries.
Scripting & Security Automation:
Proficiency in Python, PowerShell, or Bash for security automation, log parsing, & threat hunting.
Experience building custom SOAR playbooks to automate incident response & threat containment.
Strong understanding of cloud security monitoring ( AWS, Azure, Google Cloud Platform ) & zero-trust architecture principles.
Deep knowledge of network security protocols, firewall technologies, & modern identity-based threats.
Note : (Please do not apply to this job if you are looking C2C opportunities)
Thank You