Security Analyst

Overview

On Site
$45 - $45
Contract - Independent
Contract - W2

Skills

ISO 27001
PCI DSS

Job Details

We are an innovative performance apparel company for yoga, running, training, and other athletic pursuits. Setting the bar in technical fabrics and functional design, we create transformational products and experiences that support people in moving, growing, connecting, and being well. We owe our success to our innovative product, emphasis on stores, commitment to our people, and the incredible connections we make in every community we're in. As a company, we focus on creating positive change to build a healthier, thriving future. In particular, that includes creating an equitable, inclusive and growth-focused environment for our people.

About this team
The cybersecurity team enables us to conduct its global operations in a secure manner and safeguard the trusted information of its guest and users. This is accomplished by understanding business risk as manifested through cybersecurity and compliance risk, and by maintain a high degree of employee awareness of all security and compliance topics. To further enhance our team, we are looking for an experienced Cyber Security Senior Analyst.

A day in the life:
The Cyber Security Senior Analyst will help the team to perform Security Operations Center (SOC) duties, which include incident response, malware analysis, and monitoring. This role will work with the team and become a senior technical contributor to implement and apply technologies, processes, and practices designed to protect networks, devices, and data from malicious attack, damage, or unauthorized access.

Conduct threat analysis, assessment, and malware analysis in support of security investigations and incident response processes.
Lead investigations into security incidents escalated from lower-tier SOC analysts.
Provide technical mentorship to Tier 1 and Tier 2 SOC analysts, sharing knowledge on incident response, threat detection, and advanced cybersecurity techniques.
Conduct root cause analysis and identify containment and remediation actions.
Recognize and research attacker tools, tactics, and procedures (TTP) in indicators of compromise (IOCs) that can be applied to current and future investigations.
Build internal scripts, tools, and automation processes to enhance detection and response capabilities.
Collaborate with technical and business teams to drive SOC initiatives acting as the SME.
Conduct threat hunting activities to proactively identify potential threats and vulnerabilities within the network.
Develop and maintain SOC runbooks and documentation to ensure consistent and effective processes.
Participate in security audits and assessments to ensure compliance with industry standards and regulations.
Provide after-hour support as needed and participate in on-call rotation.

Qualifications:
Bachelor s degree in cybersecurity, computer science, information technology, or related field.
5+ years experience in a Security Operations Center or Technical Incident Response role.
Strong knowledge of incident response methodologies, including NIST 800-61.
Proven track record of handling advanced and complex security incidents.
Demonstrated experience in computer security-related disciplines such as incident response, host forensics, malware analysis, container security, network traffic analysis, Insider Threat, alert tuning, and trend analysis.
Strong knowledge of cloud security in Azure, AWS, Google Cloud Platform.
Extensive experience working with security tools such as Azure Sentinel, Splunk, Microsoft Defender Security Suite, firewalls, IDS/IPS, antispam, content management, server and network device hardening, etc.
Strong understanding of security concepts and threat categories (such as malware, phishing attacks, Defense-in-Depth, MITRE ATT&CK framework, Cyber Kill Chain, etc.).
Strong knowledge of Windows, Linux, and Mac OS
Advanced Experience with query languages such as KQL and SPL
Experience with scripting languages such as Bash, PowerShell, or Python.
Experience in using security orchestration, automation, and response tools.
The ability to effectively communicate both verbally and in writing to audiences of different technical skill levels.
Strong analytical and troubleshooting abilities to investigate, identify, and resolve security incidents quickly and effectively.
Capability to remain calm, composed, and focused during high-pressure situations, ensuring a clear and effective incident response.
Knowledge of security frameworks and standards such as ISO 27001, PCI DSS, and NIST.
Ability to conduct forensic analysis of network packet captures, DNS, proxy, and host-based security logs.
Experience with cloud security posture management (CSPM) tools and practices.

Must haves:
Acknowledges the presence of choice in every moment and takes personal responsibility for their life.
Possesses an entrepreneurial spirit and continuously innovates to achieve great results.
Communicates with honesty, kindness and creates the space for others to do the same.
Leads with courage, knowing the possibility of greatness is bigger than the fear of failure.
Fosters connection by putting people first and building trusting relationships.
Integrates fun and joy as a way of being and working, aka doesn t take themselves too seriously.

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.