Client Name: Kforce
End Client Name: Northern Bank
Job Title: CyberSec Analyst
Location: Woburn MA- Local only with Local DL
Work Type: Onsite (5 days/week must be local)
Job Type: Contract (6 months)
Rate: $52-57/hr on W2
LinkedIn is a MUST
Please help me with a clear Visa copy (unhidden details MUST)
Notes:
- Interview Type: Video
- Minimum 8 years of experience required
- Banking industry experience is a strong plus
- Urgent requirement local candidates preferred and prioritized
8 years of experience minimum
Banking experience is a major PLUS
Required Qualifications:
- Bachelors degree in Cybersecurity Computer Science Information Security or related field.
- threat hunting SOC analysis or cyber threat intelligence.
- Strong understanding of MITRE ATT&CK framework kill chain models and adversary emulation.
- Experience with SIEM platforms (e.g. CrowdStrike Sentinel QRadar) and EDR tools (e.g. CrowdStrike Defender).
- Experience with email protection systems (e.g. Mimecast Defender Purview)
- Strong analytical skills and the ability to interpret large datasets to identify patterns and anomalies.
- Basic scripting knowledge (e.g. Python PowerShell) for automation and data parsing.
- Excellent analytical investigative and communication skills.
Key Responsibilities:
- Collaborate with a senior cybersecurity specialist to conduct proactive threat hunting across endpoints networks and cloud environments.
- Analyze security data from SIEM EDR and other telemetry sources to identify anomalies and potential threats.
- Analyze network traffic endpoint telemetry and log data to identify indicators of compromise (IOCs) and tactics techniques and procedures (TTPs).
- Develop and fine-tune detection rules alerts and dashboards to improve visibility and response times.
- Perform deep-dive investigations into suspicious activity and provide detailed analysis and reporting.
- Collaborate with threat intelligence teams to correlate internal findings with external threat data.
- Participate in the development of threat hunting playbooks and contribute to continuous improvement of detection methodologies.
- Assist in the creation of reports and presentations to communicate findings to technical and non-technical stakeholders.
- Support vulnerability management efforts by identifying and tracking remediation of security gaps.
- Stay current with emerging threats attack techniques and cybersecurity trends.