Overview
Skills
Job Details
Position : Sr Cyber Security Analyst
Duration: 04 Months Contract to Perm
Location: Must be able to interview in person in Woburn MA; schedule will be fully onsite 5 days/week
Seeking a detail-oriented and proactive Cyber Security Analyst to join our First Line of Defense (1LoD) team. In this role, you will work closely with a senior cybersecurity specialist, contributing to a collaborative and knowledge-rich environment. Your primary responsibilities will include threat hunting, data analysis, and early detection of cyber threats to identify patterns, uncover hidden threats, and improve our overall security posture to protect the organization's digital assets.
Key Responsibilities:
-Collaborate with a senior cybersecurity specialist to conduct proactive threat hunting across endpoints, networks, and cloud environments.
-Analyze security data from SIEM, EDR, and other telemetry sources to identify anomalies and potential threats.
-Analyze network traffic, endpoint telemetry, and log data to identify indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs).
-Develop and fine-tune detection rules, alerts, and dashboards to improve visibility and response times.
-Perform deep-dive investigations into suspicious activity and provide detailed analysis and reporting.
-Collaborate with threat intelligence teams to correlate internal findings with external threat data.
-Participate in the development of threat hunting playbooks and contribute to continuous improvement of detection methodologies.
-Assist in the creation of reports and presentations to communicate findings to technical and non-technical stakeholders.
-Support vulnerability management efforts by identifying and tracking remediation of security gaps.
-Stay current with emerging threats, attack techniques, and cybersecurity trends.
Required Qualifications:
-Bachelor's degree in Cybersecurity, Computer Science, Information Security, or related field.
-5+ years of experience in threat hunting, SOC analysis, or cyber threat intelligence.
-Strong understanding of MITRE ATT&CK framework, kill chain models, and adversary emulation.
-Experience with SIEM platforms (e.g., CrowdStrike, Sentinel, QRadar) and EDR tools (e.g., CrowdStrike, Defender).
-Experience with email protection systems (e.g., Mimecast, Defender, Purview)
-Strong analytical skills and the ability to interpret large datasets to identify patterns and anomalies.
-Basic scripting knowledge (e.g., Python, PowerShell) for automation and data parsing.
-Excellent analytical, investigative, and communication skills.
Preferred Certifications:
-CompTIA Security+ or CySA+
-GIAC Security Essentials (GSEC)
-Certified SOC Analyst (CSA)
-Microsoft SC-200 (Security Operations Analyst Associate)