Lead Cybersecurity Analyst | W2

Overview

Hybrid
$75 - $80
Contract - W2
Contract - 18 Month(s)

Skills

Advanced Incident Response & Forensics
Global Cybersecurity Operations Center ( CSOC )

Job Details

Need - Principal / Lead Cybersecurity Analyst who can work on W2
Location: Greensboro, NC (Hybrid, 2-3x per week)

Monday-Friday - 2pm -10pm ESt ( Shift timing )

Need - / L2/ / USC
As a Principal Cybersecurity Analyst , you will be a senior technical leader within the Global Cybersecurity Operations Center ( CSOC ). This role combines expert - level hands - on incident response, advanced threat hunting, & digital forensics with strategic cybersecurity leadership.
Need to play a critical role in shaping CSOC strategy, working alongside the Head of CSOC to refine detection, response, & intelligence capabilities to proactively defend against emerging threats. As a recognized subject matter expert ( SME ), you are expected to stay ahead of cyber threat trends, attack methodologies, & adversary tactics, ensuring the CSOC is future - ready & resilient against evolving cyber threats.
Minimum Qualifications:

Education & Experience
Bachelor s or Master s degree in Cybersecurity, Computer Science, or a related field.
10+ years of hands - on cybersecurity experience, with deep expertise in SOC operations, incident response, & cyber threat intelligence.
Demonstrated experience leading complex investigations into APTs, cybercrime operations, & enterprise - wide security incidents.
Technical Skills & Expertise

Advanced Incident Response & Forensics:
Expert-level proficiency in digital forensics, memory analysis, network forensics, & endpoint telemetry analysis.
Ability to track adversary TTPs across enterprise environments using advanced threat intelligence correlation
Hands-on experience with industry - leading SIEM, EDR, IDS / IPS, forensic tools, & threat intelligence platforms.
Proficiency in YARA rule development, Sigma rules, & custom detection engineering.
Expert understanding of nation-state cyber threats, APT campaigns, & cybercriminal ecosystems.
Strong working knowledge of MITRE ATT & CK, Diamond Model, Cyber Kill Chain, & TIBER - EU methodologies.
Ability to reverse engineer malware & extract indicators of compromise ( IOCs ) & tactics of adversaries.
Scripting & Security Automation:
Proficiency in Python, PowerShell, or Bash for security automation, log parsing, & threat hunting.
Experience building custom SOAR playbooks to automate incident response & threat containment.
Strong understanding of cloud security monitoring ( AWS, Azure, Google Cloud Platform ) & zero-trust architecture principles.
Deep knowledge of network security protocols, firewall technologies, & modern identity-based threats.

Note : (Please do not apply to this job if you are looking C2C opportunities)
Thank You

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.

About Pioneer IT Systems LLC