
Cyber Analyst
TechBiz Global
full-time
Posted on:
Location Type: Remote
Location: Remote • 🇮🇳 India
Visit company websiteJob Level
JuniorMid-Level
Tech Stack
CloudCyber Security
About the role
- Monitor and manage EDR (Endpoint Detection and Response) and XDR (Extended Detection and Response) platforms to identify, analyze, and respond to security threats in real time.
- Perform continuous security monitoring within the Security Operations Center (SOC) environment, handling a high volume of alerts from endpoints, networks, and cloud infrastructures.
- Analyze security logs, alerts, and telemetry data to detect suspicious activity, malware, and potential breaches.
- Investigate, triage, and respond to security incidents, following established incident response procedures and escalation paths.
- Conduct threat analysis and root cause investigations to determine impact, scope, and remediation actions.
- Collaborate with SOC team members and other IT/security teams to contain, remediate, and prevent recurring incidents.
- Maintain accurate incident documentation and ensure proper case management within ticketing systems.
- Produce daily and weekly security reports, summarizing alerts, incidents, trends, and response actions for management and stakeholders.
- Continuously tune and optimize detection rules, alerts, and workflows to reduce false positives and improve detection efficiency.
- Stay informed on emerging threats, attack techniques, and industry best practices to enhance overall security posture.
Requirements
- Proficiency in EDR/XDR platforms for continuous endpoint surveillance, behavioral analysis, and event correlation via SIEM tools.
- Expertise in threat hunting, alert triage, false positive qualification, and initial remediation like endpoint isolation or domain blocking.
- Knowledge of network protocols, logs (Syslog, Windows Events), scripting (PowerShell), and Cyber Threat Intelligence (CTI) for threat contextualization
- Bachelor's or Master's degree (Bac+3 equivalent) in cybersecurity, IT, or related fields, plus certifications, vendor-specific ESET, Trellix, Barracuda, SentinelOne, Fortigate.
- 2-5 years in SOC Tier 1/2 roles, with hands-on experience triaging alerts on EDR/XDR consoles to minimize noise.
Benefits
- Ongoing training in advanced threats (EDR, XDR, MDR) to progress to senior positions.
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard skills
EDRXDRSIEMthreat huntingalert triagePowerShellCyber Threat Intelligencenetwork protocolsincident responsemalware analysis
Soft skills
collaborationcommunicationincident documentationproblem-solvinganalytical thinkingattention to detailtime managementadaptabilityteamworkreporting
Certifications
Bachelor's degree in cybersecurityMaster's degree in cybersecurityESET certificationTrellix certificationBarracuda certificationSentinelOne certificationFortigate certification