Level 2 Cyber Security Analyst

New
United StatesFull-TimeMiddle
Salary100,000 USD per year
Apply NowOpens the employer's application page

Job Details

Experience
2–4 years

Requirements

  • 2–4 years of experience in a SOC, incident response, or security operations role.
  • 2–4 years of hands-on experience with Microsoft Defender for Endpoint, CrowdStrike EDR, SentinelOne EDR, or Stellar Cyber XDR.
  • Strong knowledge of attacker tactics aligned to MITRE ATT&CK and NIST.
  • Solid understanding of Windows security fundamentals and Linux/macOS concepts.
  • Familiarity with common security log sources, SIEM concepts, and ticketing workflows.
  • Ability to write clear incident documentation for technical and non-technical stakeholders.
  • Experience handling sensitive information and following change controls.
  • Strong knowledge of Windows and Linux operating systems.

Responsibilities

  • Monitor and triage security alerts from EDR/XDR, SIEM, and related security tooling.
  • Investigate endpoint threats (malware, ransomware, credential theft, etc.) using industry-standard tools.
  • Perform incident response activities: evidence collection, scoping, containment, eradication, recovery, and reporting.
  • Conduct endpoint and host-based analysis across Windows, Linux, and macOS.
  • Correlate telemetry across endpoint, identity, network, and cloud sources.
  • Execute response actions (isolate host, kill processes, block indicators) per playbooks.
  • Develop and maintain detection and response playbooks/runbooks.
  • Create and tune alerting rules to improve signal quality.
  • Document investigations (timelines, IOCs, recommendations).
  • Support threat hunting and mentor teammates.
View Full Description & ApplyYou'll be redirected to the employer's site
100,000 USD per year
Apply Now