About the Role
We are seeking a skilled Cybersecurity Analyst to join our team. This is a dynamic role that requires strong analytical and problem-solving skills, as well as excellent communication and collaboration abilities.
Job Description
The successful candidate will be responsible for performing Tier II security analysis tasks across network, endpoint, log, and cloud security in a fast-paced and dynamic environment. This includes:
* Completing complex high-priority client support tickets
* Participating in Incident/Breach response investigations and delivering incident response reports and after-action reviews
* Working on various internal projects/initiatives such as UAT of new SOC tools, working cross-functionally with other teams/departments as a stakeholder for the Service Delivery Organization
* Writing or providing input to our Learning and Development team on KB Articles or training content
* Delivering training modules and conducting assessments with new hires
* Ongoing mentoring and coaching of Tier I Analysts
* Participating in Quarterly Service Reviews (QSRs) with our Customer Success Team providing technical input from the SOC where necessary
* Secondary review and approval of permanent signal filters, Global Denylist IP Nominations, and high-priority client alerts
* Critical Event Reviews – performing secondary audits of selected signals and following up with analysts and clients as necessary
The ideal candidate will have a strong background in cybersecurity, excellent analytical and problem-solving skills, and excellent communication and collaboration abilities.
Requirements
To be successful in this role, you will need:
1. A relevant degree in Computer Science, IT Security, IT Management, IT Support or related discipline
2. 3+ years' full-time experience in a Security Operations Centre or similar Cyber Security Analysis role excluding time spent on an intern or work experience program
3. Hands-on experience in at least one of the following Security domains:
* Network Security including Intrusion Detection Systems (IDS)
* Windows Endpoint Security, using EDR products such as VMware Carbon Black Response/Threat Hunter, Crowdstrike Falcon or Microsoft Defender ATP
* SIM/Log Management, using products such as SumoLogic, Splunk or similar
4. Knowledge and experience of network and endpoint security technologies including:
* Snort/Suricata, Packet Capture (PCAP) Analysis using Wireshark
* Windows system internals, knowledge of PowerShell