Cyber Security Analyst @ Moorecroft Systems | Jobright.ai
JOBSarrow
RecommendedLiked
0
Applied
0
External
0
Cyber Security Analyst jobs in United States
200+ applicants
company-logo

Moorecroft Systems · 10 hours ago

Cyber Security Analyst

ftfMaximize your interview chances
ConsultingInformation Technology
check
Actively Hiring
badNo H1Bnote

Insider Connection @Moorecroft Systems

Discover valuable connections within the company who might provide insights and potential referrals.
Get 3x more responses when you reach out via email instead of LinkedIn.

Responsibilities

Gather, analyze, and distribute actionable threat intelligence from open-source data, private intelligence feeds, and internal telemetry.
Monitor and assess threat actors, their tactics, techniques, and procedures (TTPs) to understand potential risks to the organization.
Author detailed threat intelligence reports focusing on adversary activity, vulnerabilities, exploits, and malware trends.
Perform proactive threat hunting to detect suspicious or malicious activity within the organization’s environment.
Develop and test hypotheses informed by threat intelligence and organizational risk assessments.
Leverage tools such as EDR/XDR, SIEM, SOAR, and threat intelligence platforms to identify indicators of compromise (IOCs).
Manage or enhance platforms supporting CTI, threat hunting, and purple team initiatives, including tools like MISP, OpenCTI, and ServiceNow.
Create integrations between tools to streamline workflows and boost operational efficiency.
Collaborate across IT and security teams to improve detection, monitoring, and response capabilities.
Build and refine security use cases, detection rules, and dashboards for ongoing threat visibility.

Qualification

Find out how your skills align with this job's requirements. If anything seems off, you can easily click on the tags to select or unselect skills to reflect your actual expertise.

Threat IntelligenceThreat HuntingSecurity EngineeringScripting in PythonScripting in PowerShellEDR/XDR toolsSIEM toolsSOAR toolsThreat Intelligence PlatformsMITRE ATT&CK frameworkVulnerability ManagementCloud Security AWSCloud Security AzureCloud Security GCPMalware AnalysisReverse EngineeringGCTI CertificationCPTIA CertificationOSCP CertificationCISSP Certification

Required

Bachelor’s degree in Cybersecurity, Computer Science, or equivalent experience.
A minimum of 3 years of experience in cybersecurity, focusing on threat intelligence, threat hunting, or security engineering.
Proficient in tools such as Splunk, ELK Stack, or threat intelligence platforms like ThreatConnect, MISP, or Anomali.
Scripting skills in Python, PowerShell, or similar languages to support automation.
Comprehensive understanding of TTPs, IOC analysis, and the MITRE ATT&CK framework.
Familiarity with vulnerability management and prioritization of patching efforts.
Ability to travel occasionally as required.

Preferred

Master’s degree in a relevant discipline.
Professional certifications like GCTI, CPTIA, OSCP, CISSP, or equivalent.
Knowledge of cloud security platforms (AWS, Azure, GCP).
Experience in malware analysis or reverse engineering.
Hands-on experience with CTI and purple team platforms such as OpenCTI, Vectr.io, or Cortex.

Company

Moorecroft Systems

twittertwitter
company-logo
Moorecroft Systems is a provider of IT professional services.

Funding

Current Stage
Growth Stage
Total Funding
unknown
2024-10-17Acquired· undefined
Company data provided by crunchbase
logo

Orion

Your AI Copilot