We use an AI-powered matching process to ensure your application is reviewed quickly, objectively, and fairly against the role's core requirements. Our system identifies the top-fitting candidates, and this shortlist is then shared directly with the hiring company. The final decision and next steps (interviews, assessments) are managed by their internal team. We appreciate your interest and wish you the best! Data Privacy Notice: By submitting your application, you acknowledge that Jobgether will process your personal data to evaluate your candidacy and share relevant information with the hiring employer. This processing is based on legitimate interest and pre-contractual measures under applicable data protection laws (including GDPR). You may exercise your rights (access, rectification, erasure, objection) at any time. #LI-CL1 We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
Senior Information Security Analyst
Location
United States
Posted
5 days ago
Salary
Not specified
Job Description
Role Description
This role provides a critical opportunity to safeguard enterprise systems and data through advanced threat detection, incident response, and proactive security monitoring. The Senior Information Security Analyst will operate within a Security Operations Center (SOC), leveraging cloud, endpoint, and network expertise to identify, analyze, and mitigate cyber threats. This role blends investigative skills, automation, and threat intelligence to protect business assets, while mentoring junior analysts and contributing to SOC process improvements. The position offers a high-impact environment where strategic thinking, technical proficiency, and continuous learning are central to success.
- Monitor and triage alerts from security platforms, including CrowdStrike Falcon and Microsoft Sentinel.
- Lead investigations into endpoint, network, and cloud security incidents, including malware, privilege escalation, and data exfiltration.
- Conduct proactive threat hunting, forensic analysis, and anomaly detection across enterprise systems and cloud environments.
- Develop and refine SOC playbooks, runbooks, and automation to improve detection, response, and operational efficiency.
- Serve as an escalation point for Tier 1 and Tier 2 analysts, mentoring junior team members and sharing threat intelligence.
- Collaborate with internal stakeholders to strengthen cloud security posture, incident readiness, and response workflows.
- Participate in red/blue team exercises and continuous SOC process and capability improvements.
Qualifications
- 4–7 years of experience in a SOC or cybersecurity analyst role.
- Expert-level proficiency with CrowdStrike Falcon and Microsoft Defender.
- Hands-on experience with SIEM platforms such as Microsoft Sentinel, Splunk, or Elastic.
- Deep knowledge of Windows, Linux, and macOS internals.
- Practical experience in cloud incident investigations across Azure, AWS, and GCP.
- Proficiency in scripting and automation (Python, PowerShell) and advanced log analysis.
- Strong understanding of MITRE ATT&CK framework, malware behavior, and incident response methodology.
- Excellent written and verbal communication skills, with the ability to influence and mentor teams.
- Preferred certifications: CCFR, CCFA, GIAC (GCIA, GCIH), CySA+, or equivalent.
- Bachelor’s degree in Cybersecurity, Information Systems, Computer Science, or related field (or equivalent experience).
Benefits
- Competitive salary reflective of experience and market standards.
- Comprehensive healthcare coverage, including medical, dental, vision, and life insurance.
- Retirement savings options, including 401(k) and employee stock purchase plan.
- Paid time off, including vacation, holidays, and sick leave.
- Flexible remote work arrangements across eligible U.S. states.
- Opportunities for professional growth, certification support, and participation in industry events.
- Collaborative and innovative work environment focused on advanced cybersecurity practices.
Company Description
Job Requirements
- 4–7 years of experience in a SOC or cybersecurity analyst role.
- Expert-level proficiency with CrowdStrike Falcon and Microsoft Defender.
- Hands-on experience with SIEM platforms such as Microsoft Sentinel, Splunk, or Elastic.
- Deep knowledge of Windows, Linux, and macOS internals.
- Practical experience in cloud incident investigations across Azure, AWS, and GCP.
- Proficiency in scripting and automation (Python, PowerShell) and advanced log analysis.
- Strong understanding of MITRE ATT&CK framework, malware behavior, and incident response methodology.
- Excellent written and verbal communication skills, with the ability to influence and mentor teams.
- Preferred certifications: CCFR, CCFA, GIAC (GCIA, GCIH), CySA+, or equivalent.
- Bachelor’s degree in Cybersecurity, Information Systems, Computer Science, or related field (or equivalent experience).
Benefits
- Competitive salary reflective of experience and market standards.
- Comprehensive healthcare coverage, including medical, dental, vision, and life insurance.
- Retirement savings options, including 401(k) and employee stock purchase plan.
- Paid time off, including vacation, holidays, and sick leave.
- Flexible remote work arrangements across eligible U.S. states.
- Opportunities for professional growth, certification support, and participation in industry events.
- Collaborative and innovative work environment focused on advanced cybersecurity practices.
Related Guides
Related Categories
Related Job Pages
More Security Analyst Jobs
Information Security Analyst safeguarding company networks and systems
Active Top Secret RequiredAbout AretumAretum is a mission-driven organization committed to delivering innovative, technology-enabled solutions to our customers across defense, civilian, and homeland security sectors. Our teams work at the intersection ...
BARR is seeking a part-time contractor to join as the Lead CMMC Certified Assessor (CCA) for our growing CMMC service line. This role offers a unique opportunity to be involved from the outset of our journey towards becoming a C3PAO, with anticipated engagement work starting in 2...
The Information Security Analyst is responsible for protecting an organization’s computer systems, networks, and data from security threats. This role involves monitoring security systems, analyzing incidents, implementing security controls, and ensuring compliance with security ...