Enable job alerts via email!

Security Analyst (Remote - US)

Jobgether

United States

Remote

USD 80,000 - 100,000

Full time

Today
Be an early applicant

Job summary

A leading technology firm is seeking a Security Analyst in the United States to monitor and respond to cyber threats. The ideal candidate will have strong analytical skills and experience in security operations. Responsibilities include investigating incidents and enhancing detection capabilities, with opportunities for career growth in cybersecurity. The position offers a competitive salary, flexible work options, and comprehensive benefits.

Benefits

Competitive salary
Performance-based bonuses
Training and certification reimbursement
Comprehensive benefits (medical, dental, vision)
Flexible work options

Qualifications

  • Proficient in security event analysis and incident response processes.
  • Strong understanding of operating systems (Windows, Linux) and network protocols.
  • Capable of conducting in-depth analysis of incidents.

Responsibilities

  • Monitor and analyze security alerts from various sources.
  • Triage, investigate, and escalate security incidents.
  • Support continuous improvement of detection rules and response procedures.

Skills

Security event analysis
Incident response
Analytical skills
Problem-solving
Communication skills
Log analysis
Packet analysis
Threat hunting

Education

2+ years of experience in a SOC, MDR, or related role
Industry certifications (GCIA, GCIH, CEH)

Tools

SIEM
EDR
IDS/IPS
Firewalls
Cloud security monitoring (AWS, Azure, GCP)
Job description

This position is posted by Jobgether on behalf of a partner company. We are currently looking for a Security Analyst (Cipher) in the United States.

The Security Analyst will be an integral part of a Managed Detection and Response (MDR) team within a dynamic Security Operations Center (SOC). This role focuses on monitoring, analyzing, and responding to cyber threats across diverse client environments. The ideal candidate will leverage advanced security tools, threat intelligence, and incident response methodologies to protect critical assets and reduce organizational risk. The position offers hands-on exposure to cutting-edge cybersecurity technologies, proactive threat hunting, and opportunities to refine incident response processes. It is well-suited for detail-oriented professionals seeking growth in cybersecurity operations, threat analysis, and risk mitigation.

Accountabilities
  • Monitor and analyze security alerts from SIEM, EDR, IDS/IPS, firewalls, and other sources.
  • Triage, investigate, and escalate security incidents following established playbooks and SLAs.
  • Conduct in-depth analysis of incidents to assess impact, scope, and remediation strategies.
  • Correlate threat intelligence with security events to enhance detection and response capabilities.
  • Support continuous improvement of MDR detection rules, use cases, and incident response procedures.
  • Collaborate with internal teams and client stakeholders to provide actionable reports and recommendations.
  • Participate in proactive threat hunting and identify potential areas for cybersecurity improvements.
  • 2+ years of experience in a SOC, MDR, or related threat detection/response role.
  • Proficient in security event analysis, incident response, and security operations processes.
  • Experience with monitoring tools such as SIEM, EDR, IDS/IPS, and firewalls.
  • Familiarity with MITRE ATT&CK framework, threat hunting techniques, and cyber kill chain methodology.
  • Strong understanding of operating systems (Windows, Linux) and network protocols.
  • Capable of log analysis, packet analysis, and malware investigation.
  • Strong analytical, problem-solving, and communication skills.
  • Ability to work in a fast-paced, 24/7 environment (may include shift-based or on-call rotations).
  • Preferred: Industry certifications such as GCIA, GCIH, CEH, CySA+; scripting or automation experience (Python, PowerShell, Bash); familiarity with cloud security monitoring (AWS, Azure, GCP).
  • Competitive salary and performance-based bonuses.
  • Training and certification reimbursement to support professional growth.
  • Exposure to advanced security tools, threat actors, and real-world incident response scenarios.
  • Career development opportunities within security operations, threat intelligence, and incident response.
  • Flexible and remote work options.
  • Comprehensive benefits including medical, dental, vision, life insurance, paid vacation, paid sick days, paid holidays, and 401K/403b plans.

Jobgether is a Talent Matching Platform that partners with companies worldwide to efficiently connect top talent with the right opportunities through AI-driven job matching.

When you apply, your profile goes through our AI-powered screening process designed to identify top talent efficiently and fairly. Our AI evaluates your CV and LinkedIn profile thoroughly, analyzing your skills, experience, and achievements. It compares your profile to the job’s core requirements and past success factors to determine your match score. Based on this analysis, we automatically shortlist the 3 candidates with the highest match to the role. When necessary, our human team may perform an additional manual review to ensure no strong profile is missed.

The process is transparent, skills-based, and free of bias — focusing solely on your fit for the role. Once the shortlist is completed, we share it directly with the company that owns the job opening. The final decision and next steps (such as interviews or additional assessments) are then made by their internal hiring team.

Thank you for your interest!

#LI-CL1

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.