TechBiz Global

Cyber Analyst

TechBiz Global

full-time

Posted on:

Location Type: Remote

Location: Remote • 🇮🇳 India

Visit company website
AI Apply
Apply

Job Level

JuniorMid-Level

Tech Stack

CloudCyber Security

About the role

  • Monitor and manage EDR (Endpoint Detection and Response) and XDR (Extended Detection and Response) platforms to identify, analyze, and respond to security threats in real time.
  • Perform continuous security monitoring within the Security Operations Center (SOC) environment, handling a high volume of alerts from endpoints, networks, and cloud infrastructures.
  • Analyze security logs, alerts, and telemetry data to detect suspicious activity, malware, and potential breaches.
  • Investigate, triage, and respond to security incidents, following established incident response procedures and escalation paths.
  • Conduct threat analysis and root cause investigations to determine impact, scope, and remediation actions.
  • Collaborate with SOC team members and other IT/security teams to contain, remediate, and prevent recurring incidents.
  • Maintain accurate incident documentation and ensure proper case management within ticketing systems.
  • Produce daily and weekly security reports, summarizing alerts, incidents, trends, and response actions for management and stakeholders.
  • Continuously tune and optimize detection rules, alerts, and workflows to reduce false positives and improve detection efficiency.
  • Stay informed on emerging threats, attack techniques, and industry best practices to enhance overall security posture.

Requirements

  • Proficiency in EDR/XDR platforms for continuous endpoint surveillance, behavioral analysis, and event correlation via SIEM tools.
  • Expertise in threat hunting, alert triage, false positive qualification, and initial remediation like endpoint isolation or domain blocking.
  • Knowledge of network protocols, logs (Syslog, Windows Events), scripting (PowerShell), and Cyber Threat Intelligence (CTI) for threat contextualization
  • Bachelor's or Master's degree (Bac+3 equivalent) in cybersecurity, IT, or related fields, plus certifications, vendor-specific ESET, Trellix, Barracuda, SentinelOne, Fortigate.
  • 2-5 years in SOC Tier 1/2 roles, with hands-on experience triaging alerts on EDR/XDR consoles to minimize noise.
Benefits
  • Ongoing training in advanced threats (EDR, XDR, MDR) to progress to senior positions.

Applicant Tracking System Keywords

Tip: use these terms in your resume and cover letter to boost ATS matches.

Hard skills
EDRXDRSIEMthreat huntingalert triagePowerShellCyber Threat Intelligencenetwork protocolsincident responsemalware analysis
Soft skills
collaborationcommunicationincident documentationproblem-solvinganalytical thinkingattention to detailtime managementadaptabilityteamworkreporting
Certifications
Bachelor's degree in cybersecurityMaster's degree in cybersecurityESET certificationTrellix certificationBarracuda certificationSentinelOne certificationFortigate certification