Cyber Security Analyst (1LoD)

Overview

On Site
$49 - $59 hourly
Accepts corp to corp applications
Contract - Independent
Contract - W2
Contract - Temp

Skills

Attention To Detail
Data Analysis
Cloud Computing
Network
Dashboard
Reporting
Collaboration
Continuous Improvement
Presentations
Vulnerability Management
Cyber Security
Threat Analysis
Emulation
SIEM
IBM QRadar
Scripting
Python
Windows PowerShell
Analytical Skill
Communication
Security+
GSEC
System On A Chip
Artificial Intelligence
Messaging

Job Details

RESPONSIBILITIES:
Kforce has a client that is seeking a Cyber Security Analyst (1LoD) in Woburn, MA.

Summary:
We are seeking a detail-oriented and proactive Cyber Security Analyst to join our First Line of Defense (1LoD) team. In this role, you will work closely with a senior cybersecurity specialist, contributing to a collaborative and knowledge-rich environment. Your primary responsibilities will include threat hunting, data analysis, and early detection of cyber threats to identify patterns, uncover hidden threats, and improve our overall security posture to protect the organization's digital assets.

Key Responsibilities:
* Collaborate with a senior cybersecurity specialist to conduct proactive threat hunting across endpoints, networks, and cloud environments
* Analyze security data from SIEM, EDR, and other telemetry sources to identify anomalies and potential threats
* Analyze network traffic, endpoint telemetry, and log data to identify indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs)
* Develop and fine-tune detection rules, alerts, and dashboards to improve visibility and response times
* Perform deep-dive investigations into suspicious activity and provide detailed analysis and reporting
* Collaborate with threat intelligence teams to correlate internal findings with external threat data
* Participate in the development of threat hunting playbooks and contribute to continuous improvement of detection methodologies
* Assist in the creation of reports and presentations to communicate findings to technical and non-technical stakeholders
* Support vulnerability management efforts by identifying and tracking remediation of security gaps
* Stay current with emerging threats, attack techniques, and cybersecurity trends

REQUIREMENTS:
* Bachelor's degree in Cybersecurity, Computer Science, Information Security, or related field
* 3+ years of experience in threat hunting, SOC analysis, or cyber threat intelligence
* Strong understanding of MITRE ATT&CK framework, kill chain models, and adversary emulation
* Experience with SIEM platforms (e.g., CrowdStrike, Sentinel, QRadar) and EDR tools (e.g., CrowdStrike, Defender)
* Experience with email protection systems (e.g., Mimecast, Defender, Purview)
* Strong analytical skills and the ability to interpret large datasets to identify patterns and anomalies
* Basic scripting knowledge (e.g., Python, PowerShell) for automation and data parsing
* Excellent analytical, investigative, and communication skills

Preferred Certifications:
* CompTIA Security+ or CySA+
* GIAC Security Essentials (GSEC)
* Certified SOC Analyst (CSA)
* Microsoft SC-200 (Security Operations Analyst Associate)

The pay range is the lowest to highest compensation we reasonably in good faith believe we would pay at posting for this role. We may ultimately pay more or less than this range. Employee pay is based on factors like relevant education, qualifications, certifications, experience, skills, seniority, location, performance, union contract and business needs. This range may be modified in the future.

We offer comprehensive benefits including medical/dental/vision insurance, HSA, FSA, 401(k), and life, disability & ADD insurance to eligible employees. Salaried personnel receive paid time off. Hourly employees are not eligible for paid time off unless required by law. Hourly employees on a Service Contract Act project are eligible for paid sick leave.

Note: Pay is not considered compensation until it is earned, vested and determinable. The amount and availability of any compensation remains in Kforce's sole discretion unless and until paid and may be modified in its discretion consistent with the law.

This job is not eligible for bonuses, incentives or commissions.

Kforce is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected veteran status, or disability status.

By clicking ?Apply Today? you agree to receive calls, AI-generated calls, text messages or emails from Kforce and its affiliates, and service providers. Note that if you choose to communicate with Kforce via text messaging the frequency may vary, and message and data rates may apply. Carriers are not liable for delayed or undelivered messages. You will always have the right to cease communicating via text by using key words such as STOP.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.

About Kforce Technology Staffing