Cybersecurity Analyst

Application ends: August 24, 2025

Apply for this job

Email *

Job Description

We’re seeking a detail-oriented Cybersecurity Analyst to support and strengthen our security operations with a proactive, intelligence-led approach. This role is hands-on and investigative: you’ll monitor our threat landscape in real-time, conduct digital forensics, and assist in shaping policies based on threat intelligence and post-incident lessons. You’ll work closely with the infrastructure, development, and compliance teams to identify and neutralize vulnerabilities—before they’re exploited.

The ideal candidate thrives in ambiguity, has strong technical depth in network security, endpoint defense, and SIEM analytics, and isn’t afraid to dissect packet captures, correlate disparate alerts, or lead a root cause analysis after a security event. If your instinct is to pull apart systems to understand how an attacker might exploit them—and then shore up the defenses—you’ll fit in well here.


Key Responsibilities

  • Monitor, analyze, and respond to security alerts generated by SIEM, EDR, and other telemetry tools
  • Conduct forensic investigations of suspicious activity across network, endpoint, and cloud environments
  • Participate in red/blue team exercises and develop detection rules based on evolving TTPs (Tactics, Techniques, and Procedures)
  • Analyze threat intel feeds and pivot findings into proactive defenses and policy recommendations
  • Assist in triaging and remediating incidents, coordinating with incident response team when needed
  • Conduct routine vulnerability scans and collaborate on remediation plans with relevant stakeholders
  • Assist with internal audits and regulatory assessments, providing evidence of security controls and incident handling
  • Develop and maintain runbooks, incident playbooks, and investigative SOPs tailored to our infrastructure
  • Stay abreast of emerging security threats, zero-day exploits, and changes to regulatory requirements (e.g., HIPAA, SOC 2, or ISO 27001 depending on industry)

Qualifications

Required:

  • Bachelor’s degree in Information Security, Computer Science, or a related technical field
  • 3+ years of hands-on experience in cybersecurity operations, threat hunting, or incident response
  • Proficiency in analyzing logs from multiple sources (firewalls, DNS, EDR, application logs)
  • Strong familiarity with MITRE ATT&CK, NIST CSF, and common frameworks for threat modeling and control mapping
  • Experience with SIEM tools (Splunk, Sentinel, or similar), EDR platforms, and scripting in Python, PowerShell, or Bash
  • Demonstrated ability to assess and remediate misconfigurations in both on-prem and cloud (AWS/Azure) environments
  • Working knowledge of packet analysis tools (e.g., Wireshark, tcpdump)

Preferred:

  • Industry certifications: GIAC (e.g., GCIA, GCIH, GCFA), OSCP, or equivalent
  • Experience in digital forensics or malware reverse engineering
  • Familiarity with DevSecOps principles and CI/CD pipeline security
  • Experience contributing to threat intelligence platforms or repositories
  • Prior work in a regulated industry (e.g., financial services, healthcare, or critical infrastructure)

Are you interested in this position?

Apply by clicking on the “Apply Now” button below!

#GraphicDesignJobsOnline#WebDesignRemoteJobs #FreelanceGraphicDesigner #WorkFromHomeDesignJobs #OnlineWebDesignWork #RemoteDesignOpportunities #HireGraphicDesigners #DigitalDesignCareers#Dynamicbrandguru