Cybersecurity Analyst monitoring network and system activity at AT&T to detect and respond to cyber threats. Participating in incident response and threat analysis for US Government Program.
Responsibilities
Monitoring network and system activity to detect and respond to potential cyber threats and incidents
Participating in the response to cybersecurity incidents, including identification, containment, eradication, and recovery
Analyzing threat intelligence to identify emerging threats and vulnerabilities and recommending mitigations
Supporting the day-to-day operations of the Security Operations Center (SOC), including the use of security tools and platforms
Requirements
Proficiency in using cybersecurity tools such as Security Information and Event Management (SIEM) systems, intrusion detection/prevention systems (IDS/IPS), and endpoint protection platforms
Understanding of network security principles and practices, including firewalls, VPNs, and network segmentation
Skills in incident handling and response, including forensic analysis and malware analysis
Ability to analyze threat intelligence data and apply it to improve the organization's security posture
A journeyman-level position typically requires ~5 + years of experience in cybersecurity or related fields
Relevant certifications such as CompTIA Security+, Certified Ethical Hacker (CEH), or GIAC Certified Incident Handler (GCIH) would be beneficial
Strong technical knowledge of cybersecurity principles, threat analysis, and defensive cyber operations
Excellent analytical and problem-solving skills
Benefits
Medical/Dental/Vision coverage
401(k) plan
Tuition reimbursement program
Paid Time Off and Holidays (at least 23 days of vacation each year and 9 company-designated holidays)
Paid Parental Leave
Paid Caregiver Leave
Additional sick leave beyond what state and local law require may be available but is unprotected
SOC Analyst II providing tier II cybersecurity support in a Security Operations Center environment. Conducting vulnerability assessments and analyzing cyber threats while training junior staff members.
Security Operations Analyst responsible for monitoring and responding to cybersecurity threats. Ensuring the confidentiality, integrity, and availability of data per compliance standards.
SOC Analyst responsible for cybersecurity incident management at Algosystems in Greece. Monitoring security threats, conducting investigations, and improving SOC services.
Cyber Operations Lead ensuring coordination of cyber operations between the Security Operations Center and internal business units. Enhancing security through effective incident response and threat management initiatives.
Solution Sales Manager enhancing revenue in financial services, focusing on ServiceNow IRM and Tanium solutions. Collaborating with teams and engaging C - level executives in Austria and Switzerland.
Senior Internal SOC Analyst leading security triage and investigations for Darktrace, utilizing AI - driven cybersecurity technology. Collaborating on incident response and mentorship within a hybrid work environment.
Security Operations Intern responsible for security monitoring at Paddy Power Betfair. Involves data loss prevention investigations and content filtering analysis with a commitment to improving security posture.
SOC Analyst L2 responsible for managing and analyzing security incidents in digital transformation. Contributing directly to the protection of companies and infrastructures.
Senior Manager leading global IT security operations to protect company data and assets at Keenova. Overseeing incident response, monitoring, and cybersecurity capabilities with strategic oversight.