As a Cyber Security Sr.Analyst, you will act as an escalation point for Level 1 analysts, perform detailed analysis of security alerts, and investigate and contain security incidents. You will also develop and maintain incident response playbooks and provide timely and accurate incident reports.
Requirements
- Bachelor’s degree in Cybersecurity, Information Technology, or related field (or equivalent experience)
- 4–6 years of experience in SOC operations or incident response roles
- Strong knowledge of SIEM platforms (e.g., Microsoft Sentinel, Splunk), EDR tools, and threat intelligence
- Proficiency in analyzing logs from firewalls, endpoints, and cloud environments
- Familiarity with MITRE ATT&CK framework and common attack techniques
- Hands-on experience with incident containment and remediation
- Excellent communication and documentation skills