IT Security Analyst T3 - 100% Remote
The Dignify Solutions, LLC
Herndon (VA)
Remote
USD 80,000 - 110,000
Full time
Boost your interview chances
Create a job specific, tailored resume for higher success rate.
Job summary
An established industry player in cybersecurity is seeking a dedicated professional with a strong background in detection engineering and threat hunting. This role involves operationalizing cyber threat intelligence and developing high-fidelity detection logic, alongside the analysis of logs from diverse environments. The ideal candidate will possess a solid understanding of cybersecurity fundamentals and experience with frameworks like MITRE ATT&CK. Join a dynamic team that values proactive threat hunting and innovative solutions to enhance security measures in a collaborative environment.
Qualifications
- 5+ years in general technical cybersecurity experience.
- 3+ years’ experience in detection engineering or incident response.
Responsibilities
- Operationalizing cyber threat intelligence into detection logic.
- Analyzing logs from endpoints, applications, and network appliances.
Skills
Cybersecurity Fundamentals
Detection Engineering
Threat Hunting
Incident Response
Log Analysis
User Behavior Analysis
Tools
SIEM Platforms
MITRE ATT&CK
D3FEND
- 5+ years in general technical cybersecurity experience.
- 3+ years’ experience in detection engineering, threat hunting, or incident response.
- Experience in operationalizing cyber threat intelligence into high-fidelity detection logic.
- Experience in systematically developing detection logic and adversarial TTP testing against said logic following formalized detection engineering lifecycle.
- Highly proficient in analyzing logs from various sources, such as endpoints, applications, network appliances, and cloud environments.
- Strong technical understanding of cybersecurity fundamentals at the network, protocol, and host levels.
- Experience with MITRE ATT&CK and/or D3FEND frameworks.
- Strong experience with SIEM platforms.
- Ability to proactively and systematically hunt for threats using investigative tools, techniques, and user behavior analysis.