US Jobs US Jobs     UK Jobs UK Jobs     EU Jobs EU Jobs

   

Cybersecurity Operations Center Analyst

Cybersecurity Operations Center Analyst

NO RELOCATION ASSISTANCE AVAILABLE.

POSITION REQURES MINIMUM OF 3 DAYS IN OFFICE.

The Cybersecurity Operations Center Analyst serves as the frontline defense for the organization's information security, responsible for the continuous monitoring of the security toolstack to identify alerts and suspicious activity.

Operating within the Cybersecurity Operations team, this role focuses on the triage and escalation of incidents based on severity, ensuring rigorous adherence to established runbooks and incident handling procedures.

This position demands a detail-oriented professional who demonstrates ownership by documenting findings, maintaining accurate incident logs, and engaging in proactive threat hunting across multiple platforms.

The Cybersecurity Analyst acts decisively to troubleshoot technical issues using multiple sources and contributes to the team's collective goals by completing backlog user stories and participating in the after-hours on-call rotation.

Responsibilities (Required):


* Monitor SIEM dashboards for alerts and suspicious activity


* Triage and escalate incidents based on severity


* Document findings and maintain incident logs


* Follow established runbooks for incident handling


* Engage in threat hunting across multiple platforms


* Complete simple backlog user stories


* Participate in after-hours on-call rotation

Experience Education (Preferred):


* Minimum of 4 years combined education (associate or bachelor's degree) or professional experience in computer science, engineering, information technology, or a related field, with focus on system administration, security operations, or incident response.

Competencies (Required):


* Attention to detail and analytical thinking


* Ability to work under pressure and follow procedures


* Basic understanding of networking and operating systems


* Ability to troubleshoot technical issues using multiple sources

Industry Knowledge/Skills (Preferred):


* Knowledge of some of the following:


* Audit requirements (PCI, HIPPA, SOX, etc.)


* Blue Team/Defensive security concepts


* Red Team/Offensive security concepts


* MITRE ATT&CK and Malware TTPs (tactics, techniques and procedures)


* Current threat landscape (threat actors, APT, cyber-crime, etc.)


* Log parsing and analysis skill set


* Incident investigation and response skill set


* Threat Intelligence

Technical/Tool Skills (Preferred):


* SIEM tools (Splunk, Crowdstrike NG SIEM, ArcSight)


* Basic TCP/IP networking concepts


* Windows/Linux system administration fundamentals


* Familiarity with host security fundamentals


* Networking security fundamentals


* Cloud computing security fundamentals

Certifications: Working Towards certifications in the following areas:


* Incident Handler (GCIH)


* Intrusion Analyst (GCIA)

This role has a salary range of $59,840 - $89...




Share Job