Enable job alerts via email!
Generate a tailored resume in minutes
Land an interview and earn more. Learn more
A leading company in cybersecurity solutions seeks a skilled cybersecurity analyst to monitor and analyze security events. The ideal candidate will possess a Bachelor's degree in Computer Science or InfoSec, experience with SIEM tools, and strong analytical skills. This role involves triaging alerts, developing detection rules, and collaborating on incident responses, offering an exciting opportunity to work in a dynamic environment.
Key Responsibilities
Monitor and analyze events via SIEM, EDR, IDS/IPS, and firewalls
Triage cybersecurity alerts and escalate incidents as needed
Investigate suspicious activity in network logs and traffic
Collaborate during incident response and root cause analysis
Develop and improve threat detection rules and runbooks
Assist with threat hunting and vulnerability assessments
Required Qualifications
Bachelor’s in Computer Science, InfoSec, or related field
Expertise in tools like Splunk, QRadar, Sentinel
Familiarity with TCP/IP, firewall logs, and MITRE ATT&CK framework
Hands-on with EDR/XDR (CrowdStrike, Sentinel One, Carbon Black)
Bonus: Python, Bash, or PowerShell skills
Certifications such as CEH, CySA+, GCIA are a strong plus
️ Preferred Skills
Cloud security monitoring experience (AWS, Azure, GCP)
Knowledge of ISO 27001, NIST, GDPR
Exposure to threat intel tools and incident handling practices