Senior Cyber Defense Analyst

Overview

Hybrid
$130,000 - $150,000
Full Time

Skills

Threat Hunting
threat intelligence
Process Improvement
mentoring

Job Details

Our New Teammate

We are on the hunt for a seasoned Senior Cybersecurity Expert with a robust background in Incident Response, Digital Forensics, or other complementary skills that would be beneficial for our Managed Detection and Response services. This role encompasses orchestrating comprehensive incident response efforts to neutralize threats swiftly, pioneering threat-hunting initiatives to uncover latent dangers within the network, and crafting sophisticated use cases and alerts to enhance our detection capabilities. A significant part of the job will involve mentoring and training junior analysts, equipping them with the skills and knowledge to help them further develop as cybersecurity professionals. The ideal candidate will possess an exceptional ability to manage complex security incidents, develop and refine threat-hunting methodologies, and continuously update and improve alerting capabilities, all while fostering the growth and development of the next generation of cybersecurity talent. This position calls for someone who is not only adept at navigating the intricacies of cybersecurity threats but is also committed to elevating the team's overall expertise and operational efficiency.

You can expect to spend your time accomplishing the following:

  • 30% of the time on Objective 1: Mentorship and Leadership of the Team
  • 20% of the time on Objective 2: Threat Hunting and Managed Detection
  • 20% of the time on Objective 3: Advanced Threat Analysis
  • 20% of the time on Objective 4: Incident Response and Management
  • 10% of the time on Objective 5: Process Improvement and Research Development

Job Responsibilities - What To Expect

  • Provide guidance and mentorship to lower-level analysts.
  • Review analyst triage and work to determine relevant training.
  • Proactively search for undetected threats within the network.
  • Develop and refine threat-hunting hypotheses and methodologies.
  • Utilize advanced analytics to predict potential future attack vectors.
  • Develop and update use case and alerting capabilities based on relevant CTI.
  • Analyze and interpret complex security events and incidents from a variety of sources including SIEM, EDR, network technologies, and threat intelligence.
  • Identify, assess, and prioritize advanced persistent threats (APT), zero-day attacks, and sophisticated malware.
  • Lead incident response efforts, coordinating with different teams to ensure timely and effective mitigation of threats.
  • Develop and document incident response protocols and procedures.
  • Conduct post-incident analysis to identify root causes and recommend improvements.
  • Continuously improve SOC processes and procedures for better effectiveness.
  • Prepare reports and briefings on security incidents and trends for diverse audiences.

Your Knowledge & Expertise

  • Minimum 5 years experience in a SOC with prior experience in a senior role.
  • Recognized cybersecurity certifications (ISC2, GIAC, etc.)
  • Expertise in various security technologies used within a SOC (SIEM, EDR, IDS/IPS, Firewalls)
  • Strong analytic and problem-solving skills
  • Excellent communication abilities
  • Highly self-motivated and intellectually curious.
  • Advanced Cybersecurity Certifications
  • Experience with digital forensics and incident response.
  • Experience with malware analysis
  • Knowledge of scripting languages
  • Prior experience with Security Orchestration and Automation Response