drjobs CyberSec Analyst

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Job Location drjobs

Woburn, MA - USA

Monthly Salary drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Vacancy

1 Vacancy

Job Description

Client Name: Kforce
End Client Name: Northern Bank

Job Title: CyberSec Analyst
Location: Woburn MA- Local only with Local DL
Work Type: Onsite (5 days/week must be local)
Job Type: Contract (6 months)
Rate: $52-57/hr on W2

LinkedIn is a MUST

Please help me with a clear Visa copy (unhidden details MUST)

Notes:

  • Interview Type: Video
  • Minimum 8 years of experience required
  • Banking industry experience is a strong plus
  • Urgent requirement local candidates preferred and prioritized


8 years of experience minimum

Banking experience is a major PLUS

Required Qualifications:

  • Bachelors degree in Cybersecurity Computer Science Information Security or related field.
  • threat hunting SOC analysis or cyber threat intelligence.
  • Strong understanding of MITRE ATT&CK framework kill chain models and adversary emulation.
  • Experience with SIEM platforms (e.g. CrowdStrike Sentinel QRadar) and EDR tools (e.g. CrowdStrike Defender).
  • Experience with email protection systems (e.g. Mimecast Defender Purview)
  • Strong analytical skills and the ability to interpret large datasets to identify patterns and anomalies.
  • Basic scripting knowledge (e.g. Python PowerShell) for automation and data parsing.
  • Excellent analytical investigative and communication skills.

Key Responsibilities:

  • Collaborate with a senior cybersecurity specialist to conduct proactive threat hunting across endpoints networks and cloud environments.
  • Analyze security data from SIEM EDR and other telemetry sources to identify anomalies and potential threats.
  • Analyze network traffic endpoint telemetry and log data to identify indicators of compromise (IOCs) and tactics techniques and procedures (TTPs).
  • Develop and fine-tune detection rules alerts and dashboards to improve visibility and response times.
  • Perform deep-dive investigations into suspicious activity and provide detailed analysis and reporting.
  • Collaborate with threat intelligence teams to correlate internal findings with external threat data.
  • Participate in the development of threat hunting playbooks and contribute to continuous improvement of detection methodologies.
  • Assist in the creation of reports and presentations to communicate findings to technical and non-technical stakeholders.
  • Support vulnerability management efforts by identifying and tracking remediation of security gaps.
  • Stay current with emerging threats attack techniques and cybersecurity trends.

Employment Type

Full-time

Company Industry

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.