
Senior MDR Analyst – Day Shift
Blackpoint Cyber
full-time
Posted on:
Location Type: Remote
Location: United States
Visit company websiteExplore more
Salary
💰 $115,000 - $125,000 per year
Job Level
About the role
- Analyze and evaluate anomalous network and system events in a 24×7 Security Operation Center (SOC) environment via conducting lead-less threat hunting
- Collaborate with MDR Analysts to research and investigate emerging cyber security threats; become an escalation point of contact for advanced intrusion analysis.
- Develop Incident analysis reports and work across business units and customers to bring issues to a close
- Help design and build automation to reduce operational tasks of SOC processes
- Provide actionable threat and vulnerability analysis based on security events for many independent customer environments
- Build test lab environments to research emerging techniques and make contributions to the internal and external knowledge development of threat operations.
- Review sandbox technologies for additional IOCs uncovered from artifacts uncovered during analysis.
Requirements
- Five (5+) years of experience in an information security role. Progressive relevant training and/or certification may be substituted for one (1) year of the experience requirement
- Experience working in a Security Operations Center (SOC), Threat Hunting, or Digital Forensics and Incident Response (DFIR), preferred
- Two (2+) years of experience with triaging endpoint events from EDR, NGAV, and supporting the Incident Response (IR) process
- Deep knowledge on assessing threat indicators in a Windows Environment (e.g. Malware/Malicious Anomalies/Abnormal network Activity/Root Level Compromise, Forensic Artifacts, etc.)
- Robust understanding of at least two of the following: Windows, Linux or OSX;
- Familiarity with ELK stack (Dashboards, Logstash Config, Searching) Scripting / Programming with Powershell, Python, and Go
- Familiarity with AWS services such as EC2, S3 and IAM and Azure/M365
- Experience in developing, refining, and performing leadless threat hunting analysis to uncover new or potential incidents and report on results
- Ability to work shifts if required (night, weekends, and day)
- Excellent problem solving, critical thinking, and analytical skills with the ability to deconstruct issues (hunting anomalous pattern detection)
- Excellent communication skills to effectively summarize and present findings.
Benefits
- Health, Vision, Dental, and Life Insurance plans
- Robust 401k plan
- Discretionary Time Off
- Other minor perks
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard Skills & Tools
threat huntingincident responseendpoint detection and response (EDR)next-generation antivirus (NGAV)malware analysisforensic analysisscriptingprogrammingWindowsLinux
Soft Skills
problem solvingcritical thinkinganalytical skillscommunication skills