Sr Cyber Security Analyst

  • Woburn, MA
  • Posted 7 hours ago | Updated 2 hours ago

Overview

On Site
Contract - W2
Contract - Months CTH

Skills

Sr Cyber Security Analyst
threat hunting
SOC analysis
or cyber threat intelligence.
SIEM platforms

Job Details

Position : Sr Cyber Security Analyst

Duration: 04 Months Contract to Perm
Location: Must be able to interview in person in Woburn MA; schedule will be fully onsite 5 days/week

Seeking a detail-oriented and proactive Cyber Security Analyst to join our First Line of Defense (1LoD) team. In this role, you will work closely with a senior cybersecurity specialist, contributing to a collaborative and knowledge-rich environment. Your primary responsibilities will include threat hunting, data analysis, and early detection of cyber threats to identify patterns, uncover hidden threats, and improve our overall security posture to protect the organization's digital assets.

Key Responsibilities:

-Collaborate with a senior cybersecurity specialist to conduct proactive threat hunting across endpoints, networks, and cloud environments.

-Analyze security data from SIEM, EDR, and other telemetry sources to identify anomalies and potential threats.

-Analyze network traffic, endpoint telemetry, and log data to identify indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs).

-Develop and fine-tune detection rules, alerts, and dashboards to improve visibility and response times.

-Perform deep-dive investigations into suspicious activity and provide detailed analysis and reporting.

-Collaborate with threat intelligence teams to correlate internal findings with external threat data.

-Participate in the development of threat hunting playbooks and contribute to continuous improvement of detection methodologies.

-Assist in the creation of reports and presentations to communicate findings to technical and non-technical stakeholders.

-Support vulnerability management efforts by identifying and tracking remediation of security gaps.

-Stay current with emerging threats, attack techniques, and cybersecurity trends.

Required Qualifications:

-Bachelor's degree in Cybersecurity, Computer Science, Information Security, or related field.

-5+ years of experience in threat hunting, SOC analysis, or cyber threat intelligence.

-Strong understanding of MITRE ATT&CK framework, kill chain models, and adversary emulation.

-Experience with SIEM platforms (e.g., CrowdStrike, Sentinel, QRadar) and EDR tools (e.g., CrowdStrike, Defender).

-Experience with email protection systems (e.g., Mimecast, Defender, Purview)

-Strong analytical skills and the ability to interpret large datasets to identify patterns and anomalies.

-Basic scripting knowledge (e.g., Python, PowerShell) for automation and data parsing.

-Excellent analytical, investigative, and communication skills.

Preferred Certifications:

-CompTIA Security+ or CySA+

-GIAC Security Essentials (GSEC)

-Certified SOC Analyst (CSA)

-Microsoft SC-200 (Security Operations Analyst Associate)

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.