Jobgether

We use an AI-powered matching process to ensure your application is reviewed quickly, objectively, and fairly against the role's core requirements. Our system identifies the top-fitting candidates, and this shortlist is then shared directly with the hiring company. The final decision and next steps (interviews, assessments) are managed by their internal team. We appreciate your interest and wish you the best! Data Privacy Notice: By submitting your application, you acknowledge that Jobgether will process your personal data to evaluate your candidacy and share relevant information with the hiring employer. This processing is based on legitimate interest and pre-contractual measures under applicable data protection laws (including GDPR). You may exercise your rights (access, rectification, erasure, objection) at any time. #LI-CL1 We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.

Senior Information Security Analyst

Security AnalystSecurity AnalystFull TimeRemote

Location

United States

Posted

5 days ago

Salary

Not specified

Crowd Strike FalconMicrosoft DefenderSIEMMicrosoft SentinelSplunkElasticWindowsLinuxMAC OSAzureAWSGCPPythonPower ShellMITRE Att&ckMalware AnalysisIncident ResponseThreat HuntingForensicsLog Analysis

Job Description

This description is a summary of our understanding of the job description. Click on 'Apply' button to find out more.

Role Description

This role provides a critical opportunity to safeguard enterprise systems and data through advanced threat detection, incident response, and proactive security monitoring. The Senior Information Security Analyst will operate within a Security Operations Center (SOC), leveraging cloud, endpoint, and network expertise to identify, analyze, and mitigate cyber threats. This role blends investigative skills, automation, and threat intelligence to protect business assets, while mentoring junior analysts and contributing to SOC process improvements. The position offers a high-impact environment where strategic thinking, technical proficiency, and continuous learning are central to success.

  • Monitor and triage alerts from security platforms, including CrowdStrike Falcon and Microsoft Sentinel.
  • Lead investigations into endpoint, network, and cloud security incidents, including malware, privilege escalation, and data exfiltration.
  • Conduct proactive threat hunting, forensic analysis, and anomaly detection across enterprise systems and cloud environments.
  • Develop and refine SOC playbooks, runbooks, and automation to improve detection, response, and operational efficiency.
  • Serve as an escalation point for Tier 1 and Tier 2 analysts, mentoring junior team members and sharing threat intelligence.
  • Collaborate with internal stakeholders to strengthen cloud security posture, incident readiness, and response workflows.
  • Participate in red/blue team exercises and continuous SOC process and capability improvements.

Qualifications

  • 4–7 years of experience in a SOC or cybersecurity analyst role.
  • Expert-level proficiency with CrowdStrike Falcon and Microsoft Defender.
  • Hands-on experience with SIEM platforms such as Microsoft Sentinel, Splunk, or Elastic.
  • Deep knowledge of Windows, Linux, and macOS internals.
  • Practical experience in cloud incident investigations across Azure, AWS, and GCP.
  • Proficiency in scripting and automation (Python, PowerShell) and advanced log analysis.
  • Strong understanding of MITRE ATT&CK framework, malware behavior, and incident response methodology.
  • Excellent written and verbal communication skills, with the ability to influence and mentor teams.
  • Preferred certifications: CCFR, CCFA, GIAC (GCIA, GCIH), CySA+, or equivalent.
  • Bachelor’s degree in Cybersecurity, Information Systems, Computer Science, or related field (or equivalent experience).

Benefits

  • Competitive salary reflective of experience and market standards.
  • Comprehensive healthcare coverage, including medical, dental, vision, and life insurance.
  • Retirement savings options, including 401(k) and employee stock purchase plan.
  • Paid time off, including vacation, holidays, and sick leave.
  • Flexible remote work arrangements across eligible U.S. states.
  • Opportunities for professional growth, certification support, and participation in industry events.
  • Collaborative and innovative work environment focused on advanced cybersecurity practices.

Company Description

Job Requirements

  • 4–7 years of experience in a SOC or cybersecurity analyst role.
  • Expert-level proficiency with CrowdStrike Falcon and Microsoft Defender.
  • Hands-on experience with SIEM platforms such as Microsoft Sentinel, Splunk, or Elastic.
  • Deep knowledge of Windows, Linux, and macOS internals.
  • Practical experience in cloud incident investigations across Azure, AWS, and GCP.
  • Proficiency in scripting and automation (Python, PowerShell) and advanced log analysis.
  • Strong understanding of MITRE ATT&CK framework, malware behavior, and incident response methodology.
  • Excellent written and verbal communication skills, with the ability to influence and mentor teams.
  • Preferred certifications: CCFR, CCFA, GIAC (GCIA, GCIH), CySA+, or equivalent.
  • Bachelor’s degree in Cybersecurity, Information Systems, Computer Science, or related field (or equivalent experience).

Benefits

  • Competitive salary reflective of experience and market standards.
  • Comprehensive healthcare coverage, including medical, dental, vision, and life insurance.
  • Retirement savings options, including 401(k) and employee stock purchase plan.
  • Paid time off, including vacation, holidays, and sick leave.
  • Flexible remote work arrangements across eligible U.S. states.
  • Opportunities for professional growth, certification support, and participation in industry events.
  • Collaborative and innovative work environment focused on advanced cybersecurity practices.

Related Job Pages

More Security Analyst Jobs

Information Security Analyst

Businessolver

Benefits Technology, Powered by People

Security Analyst5 days ago
Full TimeRemoteTeam 1,001-5,000Since 1998H1B Sponsor

Information Security Analyst safeguarding company networks and systems

FirewallsLinux
United States
$65K - $75K / year
Full TimeRemoteTeam 501-1,000H1B No Sponsor

Active Top Secret RequiredAbout AretumAretum is a mission-driven organization committed to delivering innovative, technology-enabled solutions to our customers across defense, civilian, and homeland security sectors. Our teams work at the intersection ...

RMFATOC5ISRIIRDoDPOA&MCUICybersecurity GovernanceDocumentationSOP DevelopmentAuthorization Package ManagementContinuous MonitoringRisk Assessment
Virginia
ContractRemoteTeam 51-200

BARR is seeking a part-time contractor to join as the Lead CMMC Certified Assessor (CCA) for our growing CMMC service line. This role offers a unique opportunity to be involved from the outset of our journey towards becoming a C3PAO, with anticipated engagement work starting in 2...

United States
Full TimeRemote

The Information Security Analyst is responsible for protecting an organization’s computer systems, networks, and data from security threats. This role involves monitoring security systems, analyzing incidents, implementing security controls, and ensuring compliance with security ...

SIEMIDSIPSDLPvulnerability scanningTCP/IPDNSfirewallsVPNNISTISO 27001SOC 2GDPRHIPAA
United States