Senior Cyber Analyst (R3665)
Shield AI
What you'll do:
- Monitor and triage security alerts from SIEM, EDR, and SOAR platforms to identify potential threats.
- Investigate suspicious activity, escalate incidents based on severity, and support incident response efforts.
- Collaborate with engineers to refine detection logic and reduce false positives.
- Participate in threat hunting activities to proactively identify indicators of compromise.
- Maintain accurate documentation of incidents, response actions, and lessons learned.
Required qualifications:
- 3+ years of experience in a Security Operations Center (SOC) or similar cybersecurity role.
- Familiarity with SIEM, EDR, and SOAR tools, and the ability to interpret logs, alerts, and telemetry data.
- Understanding of common attack vectors, threat actors, and incident response workflows.
- Strong analytical and problem-solving skills with the ability to work independently under pressure.
- Excellent written and verbal communication skills for documenting and escalating incidents clearly.
Preferred qualifications:
- Experience with threat hunting techniques and applying threat intelligence to investigations.
- Hands-on knowledge of endpoint detection and response (EDR), security information and event management (SIEM), or security orchestration, automation, and response (SOAR) tools.
- Familiarity with the MITRE ATT&CK framework and its use in detection and analysis.
- Background in scripting or automation (e.g., Python, PowerShell) to streamline SOC operations.
- Relevant certification, education, or military experience in cybersecurity operations or analysis.