Cybersecurity Analyst Job Description
We are seeking a highly skilled Cybersecurity Analyst to protect our organization’s digital assets from evolving threats. The ideal candidate will monitor, detect, and respond to security incidents while implementing robust defense strategies. You will play a critical role in safeguarding sensitive data, ensuring compliance, and mitigating risks across our infrastructure.
Monitor SIEM tools (Splunk, IBM QRadar, Microsoft Sentinel) for suspicious activity
Investigate and respond to security incidents (malware, phishing, DDoS, insider threats)
Conduct vulnerability assessments (Nessus, Qualys, OpenVAS) and prioritize remediation
Perform forensic analysis (FTK, Wireshark, Volatility) to trace attack origins
Implement EDR/XDR solutions (CrowdStrike, Palo Alto Cortex, Microsoft Defender)
Enforce security policies and access controls (IAM, PAM, Zero Trust)
Manage firewalls (Palo Alto, Fortinet), IDS/IPS, and email security (Proofpoint, Mimecast)
Ensure compliance with GDPR, HIPAA, NIST, ISO 27001 frameworks
Conduct penetration testing (Metasploit, Burp Suite) and red teaming exercises
Automate security tasks using Python, PowerShell, or Bash
Develop threat intelligence reports and risk assessments
Collaborate with IT teams to harden systems (patch management, configuration baselines)
Train employees on security best practices (phishing simulations, security awareness)
Maintain incident response plans and lead tabletop exercises
✅ SIEM/SOAR: Splunk, LogRhythm, IBM QRadar
✅ Endpoint Protection: CrowdStrike, SentinelOne, Carbon Black
✅ Network Security: Firewalls (Palo Alto, Cisco ASA), IDS/IPS (Snort, Suricata)
✅ Cloud Security: AWS GuardDuty, Azure Security Center, GCP Security Command Center
✅ Vulnerability Mgmt.: Qualys, Tenable.io, Rapid7
OS Security: Windows/Linux hardening, Active Directory, GPO
Scripting: Python (for automation), PowerShell, Bash
Encryption: PKI, SSL/TLS, VPNs (IPSec, WireGuard)
Threat Intel: MITRE ATT&CK, TTPs, IOC analysis
Required:
Bachelor’s degree in Cybersecurity, Computer Science, or related field
Security+, CYSA+, or CEH certification
Preferred:
CISSP, GSEC, or OSCP (for advanced roles)
Cloud security certs (AWS/Azure Security Specialty, CCSP)
3+ years in SOC, incident response, or vulnerability management
Hands-on experience with SIEM, EDR, and firewall technologies
Knowledge of regulatory frameworks (NIST, ISO 27001, PCI-DSS)
Familiarity with DevSecOps (CI/CD pipeline security)
Analytical Thinking: Identifying patterns in security logs
Communication: Explaining risks to non-technical stakeholders
Problem-Solving: Rapid incident containment and root-cause analysis
Attention to Detail: Spotting anomalies in large datasets