Overview
On Site
120k - 145k
Full Time
Skills
Customer Facing
Firewall
Python
Windows PowerShell
Microsoft Windows
Linux
Packet Analysis
FireEye
Sophos
Network Forensics
Threat Analysis
Security Operations
Cyber Security
Research
Training
Incident Management
Computer Networking
Scripting
Process Engineering
Open Source
Forensics
Network
Communication
Reporting
Collaboration
Job Details
Our client is a Managed Security Service Provider looking to bring on a Cybersecurity Analyst to join their growing team. This position is ideal for someone who thrives in complex and fast-moving environments, enjoys solving technical puzzles, and is passionate about proactive security. This is a client-facing position where you will be responsible for providing Managed Detection and Response (MDR) services and performing in-depth threat hunting and forensic analysis across diverse networks and environments.
This role requires a candidate who is capable of working independently, engaging directly with clients, and offering continuous improvements to their security posture. You will work with several clients simultaneously, acting as an extension of their internal security teams while using advanced tools for detection, investigation, and response.
Required Skills & Experience
Desired Skills & Experience
What You Will Be Doing
Tech Breakdown
Daily Responsibilities
This role requires a candidate who is capable of working independently, engaging directly with clients, and offering continuous improvements to their security posture. You will work with several clients simultaneously, acting as an extension of their internal security teams while using advanced tools for detection, investigation, and response.
Required Skills & Experience
- Minimum of 3 years of experience in cyber incident response, ideally in external or multi-company environments
- Minimum of 3 years of proactive threat hunting experience within network traffic and Endpoint Detection and Response (EDR) tools
- Experience handling complex cases such as ransomware or large-scale intrusions
- Deep technical familiarity with network traffic analysis and packet capture techniques
- Ability to analyze logs from Windows systems, firewalls, and other network devices
- Hands-on experience with scripting and automation, preferably in Python or PowerShell
Desired Skills & Experience
- Previous background as a systems administrator in Windows, Linux, or network environments
- Exposure to open-source security tools and technologies used in forensics and packet analysis
- Experience with EDR tools such as CrowdStrike, SentinelOne, FireEye, or Sophos
- Strong understanding of network forensics, threat intelligence, and how to act on findings
- Familiarity with SOAR platforms or automation in security operations
- A personal home lab or history of continuous self-education in cybersecurity through research, articles, or training
What You Will Be Doing
Tech Breakdown
- 40% Threat Hunting and Incident Response
- 35% EDR and Networking Forensics
- 25% Scripting, Automation, and Security Process Development
Daily Responsibilities
- 40% Perform daily proactive threat hunting across client environments using both proprietary and open-source tools
- 25% Conduct forensic analysis of network traffic and endpoint data to identify and mitigate threats
- 20% Work directly with assigned clients as part of their extended security teams, providing daily communication and reporting on findings
- 10% Collaborate with internal engineers to share insights, refine processes, and develop new detection capabilities
- 5% Participate in weekly team sessions to discuss emerging threats, new tools, and findings from ongoing investigations
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.