Digit7

Security Analyst – Tier 3

Digit7

full-time

Posted on:

Location Type: Hybrid

Location: BostonMassachusettsUnited States

Visit company website

Explore more

AI Apply
Apply

Salary

💰 $140,000 - $152,000 per year

About the role

  • Analyze and validate investigations completed by the AI Agents for accuracy and completeness, evaluating risk
  • Lead and mentor junior analysts and serve as the technical expert and key escalation point for investigations
  • Correlate data from various data sources including cloud, endpoint, identity, network, etc. to understand that full picture of a malicious activity
  • Investigate malicious activity that the 7AI Agents responded to and understand the complexity of the attack that was stopped including the risk that was prevented for customers
  • Use our advanced AI Agents to hunt in customer environments to detect and remediate emerging threats, ultimately contributing to detections that will be folded back into the product
  • Assist customers with ongoing threat monitoring, triage, and prioritization of security alerts as needed but especially during incidents to resolve threats and secure the environment
  • Proactively identify potential threats and anomalies in customer environments by reviewing logs and malicious findings
  • Utilize your supreme communication skills to engage with customers who vary in their level of technical depth and focus (from SOC analysts to CISOs)
  • Architect processes while we build out this elite organization to scale the operation sustainably while maintaining consistent quality
  • Collaborate with the Sales, Engineering, and Product teams, providing feedback on the customer experience and assist in optimizing and tuning the AI platform
  • Stay current with emerging cybersecurity trends, vulnerabilities, and new attack techniques, especially the field of AI-driven attacks

Requirements

  • 5+ years of experience in cyber security operations
  • Hands-on experience with investigating alerts and across multiple sources (endpoint, network, identity, email, cloud, etc.)
  • Strong understanding of security monitoring tools (XDR, SIEM, IDS/IPS, IDP, etc.)
  • Familiarity with log \ telemetry concepts
  • Experience analyzing and investigating security alerts from multiple sources, including intrusion detection systems, network monitoring tools, and endpoint protection platforms
  • Strong knowledge of common attack techniques and frameworks (MITRE ATT&CK) and incident triage methodologies
  • Strong analytical and problem-solving skills, with the ability to verify AI-driven analysis and make independent security decisions
  • Data querying experience with SIEM querying technologies (SPL, KQL, FQL, SQL, etc) and familiarity with log / telemetry concepts
  • Strong knowledge with Malware Analysis methods
  • Great interpersonal skills with a service oriented mindset
  • Proven track record of successfully collaborating in a team, including mentorship skills and ability to teach complex concepts
  • Prior experience in a Managed Services environment
  • Incident Handling experience
  • Relevant certifications: Security+, GSEC, GCIH.
Benefits
  • Offers Equity 📊 Check your resume score for this job Improve your chances of getting an interview by checking your resume score before you apply. Check Resume Score
Applicant Tracking System Keywords

Tip: use these terms in your resume and cover letter to boost ATS matches.

Hard Skills & Tools
cyber security operationsinvestigating alertssecurity monitoring toolslog telemetry conceptsincident triage methodologiesdata queryingMalware Analysis methodsMITRE ATT&CKSIEM querying technologiesindependent security decisions
Soft Skills
communication skillsinterpersonal skillsmentorship skillsanalytical skillsproblem-solving skillsservice oriented mindsetcollaboration skillsability to teach complex concepts
Certifications
Security+GSECGCIH