Senior Cyber Threat Analyst enhancing cybersecurity responses through technical threat hunting and SOC investigations. Collaborating cross-functionally to improve detection and response capabilities.
Responsibilities
Lead and support advanced SOC investigations, incident response activities, and Tier-3 escalations, providing deep technical analysis of security alerts, anomalous behavior, and suspected malicious activity
Perform proactive threat hunting activities across enterprise security telemetry including SIEM, EDR, identity, network, and cloud logs to identify previously undetected or emerging threats
Analyze attacker behaviors and intrusion patterns to develop threat hunting hypotheses and detection strategies aligned with the MITRE ATT&CK framework
Investigate complex security alerts and incidents, performing log analysis, endpoint analysis, and timeline reconstruction to determine root cause, scope, and impact
Leverage internal telemetry, alerts, and IOC trends to identify threat patterns targeting the organization and opportunities for improved detection coverage
Enhance threat detection and response capabilities by supporting the development and improvement of SOC detection logic, response procedures, escalation playbooks, and analyst decision trees
Conduct proactive analysis of alert trends to identify gaps in detection coverage and recommend new or improved monitoring capabilities
Utilize Cyber Threat Intelligence (CTI) sources to contextualize incidents, inform threat hunting efforts, and prioritize investigations
Monitor open-source, closed-source, and vendor-provided threat intelligence to stay abreast of emerging threats, vulnerabilities, and adversary tactics relevant to the organization
Develop and maintain profiles of relevant threat actors, including tactics, techniques, and procedures (TTPs), and incorporate those insights into threat hunting and detection strategies
Assist in SOC and Incident Response escalations, providing technical expertise and investigative support during security incidents
Conduct threat, risk, and vulnerability assessments to provide actionable remediation and security control improvement guidance
Collaborate with the Red Team and Cyber Incident Management to support red team exercises, incident response training, tabletop exercises, and detection validation
Perform targeted access reviews and anomaly analysis across enterprise systems (Windows, Linux, databases, network infrastructure, cloud platforms) to identify suspicious activity
Collaborate with DLP and other security teams on insider risk investigations and monitoring initiatives
Contribute to the development and improvement of SOC procedures, threat hunting methodologies, and intelligence-driven detection processes
Collaborate with relevant stakeholders on security awareness messaging and threat awareness related communications
Requirements
Bachelor’s degree in Cybersecurity, Computer Science, Information Technology, or related field
5+ years of experience in Security Operations, Incident Response, Threat Hunting, Detection Engineering, and/or related cybersecurity roles
Data & Logistics Intelligence Analyst focused on advanced data analysis and automation for industrial projects at ALTEN México. Collaborating on data validation and integration from multiple systems.
Tier III Analyst supporting advanced threat hunting and incident response in a Virtual Security Operations Center environment. Requires strong analytical skills and 4+ years of experience in cybersecurity operations.
Analyst responsible for monitoring commercial performance at Localiza&Co to support decision making and continuous improvement. Engaging in sales performance tracking and pipeline management.
Join NordVPN as a Principal Threat Intelligence Researcher shaping Threat Protection capabilities. Lead research excellence for online security, working alongside expert teams.
Competitive Intelligence Analyst at Wilson Sonsini conducting in - depth research and analysis for client development. Collaborating with cross - functional teams and staying abreast of legal industry trends.
Senior Provider Network Intelligence Analyst at Banner Health leading data - driven solutions and innovative process improvement initiatives. Collaborating on key projects and automating workflows to enhance healthcare operations.
Data Analyst supporting data architecture evolution at Grupo Marista. Collaborating on ETL processes and developing BI reports and dashboards with Power BI.
Geospatial Intelligence Analyst providing geospatial analysis for operations in Reston, VA. Supporting intelligence operations through comprehensive assessments and collaboration with intelligence community.
Analyst for operational support, structuring and analyzing financial data for supply chain management based in Brazil. Engaging in process improvements and data - driven decision - making.
Senior Market Intelligence Analyst working with large pharmaceutical and perfumery companies. Providing insights and analytical support to meet client needs and enhance data quality.