LogicalisUS · 1 day ago
Senior Security Analyst
LogicalisUS is focused on designing, supporting, and executing clients' digital transformation through technology expertise and industry insights. The Senior Security Analyst will be responsible for detection engineering, threat hunting, and incident response, ensuring the security and integrity of clients' systems.
Data CenterInformation TechnologyIT Infrastructure
Responsibilities
Design, develop, and deploy high-fidelity detection rules in SIEM (Splunk, Microsoft Sentinel, Devo, QRadar, EDR, etc.)
Create custom use cases to detect MITRE TTPs aligned with real-world threats and red team activities
Conduct detection gap analysis, tune alerting mechanisms, and eliminate false positives at the MSS customer environment
Perform regular fine-tuning and optimization of detection rules, correlation logic, and alert thresholds across SIEM, EDR, and other security platforms to enhance detection accuracy and reduce false positives
Continuously assess detection efficacy based on incident feedback and threat landscape evolution, implementing improvements accordingly
Collaborate with red/purple teams to validate detection logic and build threat-informed defenses
Regularly review, update, and enhance detection logic to ensure alignment with the latest threat intelligence, adversary TTPs, and evolving attack techniques
Maintain relevancy and effectiveness of security detections by incorporating insights from threat hunts, incident response cases, red team exercises, and industry best practices
Proactively hunt for advanced threats across on-prem and cloud environments using telemetry from SIEM, EDR, NDR, and threat intelligence
Develop hypotheses based on TTPs, threat intelligence feeds, and incident trends
Use frameworks like MITRE ATT&CK and Diamond Model to structure hunting campaigns
Document hunt procedures and outcomes to support knowledge sharing and continuous improvement
Map threat actor TTPs to frameworks such as MITRE ATT&CK to support proactive defense strategies and inform detection engineering efforts
Provide actionable threat intelligence to SOC, detection engineering, and IR teams to inform custom detection rule development, prioritization of hunts, and incident scoping
Contribute to the threat intelligence lifecycle, including direction, collection, processing, analysis, dissemination, and feedback
Ingest, analyze, and operationalize threat intelligence from internal sources, commercial feeds, and open-source intelligence (OSINT) to enrich detection logic, threat hunting hypotheses, and incident investigations
Collaborate with internal and commercial threat intelligence teams to contextualize IOCs and TTPs for targeted and industry-specific threats
Maintain up-to-date threat intelligence repositories and contribute to the continuous improvement of threat intel processes and playbooks
Lead incident response lifecycle (detection, triage, containment, eradication, recovery)
Handle security incidents tickets escalated by Level II team, and draft security incident report covering the root cause, forensic evidence, and recommended mitigation plans
Conduct/support forensic analysis of endpoints, logs, and network traffic to determine root cause and impact
Coordinate with internal stakeholders and external partners during critical incidents
Develop and maintain playbooks, runbooks, and incident reports
Mentor and support L1/L2 SOC analysts in investigations, tool usage, and processes
Participate in tabletop exercises and red/purple team assessments
Lead and conduct regular customer meetings to review SOC activities, including security posture, key metrics, and ongoing initiatives
Prepare and deliver detailed briefings on priority incidents, RCA, ensuring timely communication of root cause, impact analysis, mitigation steps, and next actions
Act as a primary point of contact for Incident escalations and maintain consistent, professional engagement with client stakeholders
Coordinate with cross-functional teams including Engineering, Development, Red Team, and Risk/Compliance
Identify gaps in existing SOC process and work with team members or other departments to create, modify standard operating procedures, to automate any mundane daily operational activities, ensuring Ops are run efficiently
Qualification
Required
Candidate should have at least 8-10 years of working experience in SOC and MSS environments
Bachelor's degree in computer engineering, Computer Science, Cyber Security, Information Security, or other equivalents
Excellent hands-on experience in implementations, incident analysis of Splunk, IBM QRadar, Azure Sentinel SIEM (Security Information and Event Management) & Devo technologies
Hands on experience on any Endpoint Protection (EPP) or Endpoint Detection Response (EDR) technologies. Preferred if CrowdStrike, Microsoft Defender
Hands on experience on SOAR (Security Orchestration, Automation, and Response) technologies
Experience in malware analysis for Windows and Linux/Mac
Exposure to firewall technologies such as Cisco, Palo Alto, Checkpoint, Fortinet
Good understanding of WIN, LINUX environments and well versed with basic LINUX commands and troubleshooting, with proven Unix (Solaris, Linux, BSD (Bumi Serpong Damai)) experience
Knowledge of any shell scripting language and applying it to automate mundane operations tasks
Knowledge of current cyber threats, attack vectors, vulnerabilities, and threat intelligence feeds
Ability to work effectively in a team environment, collaborate cross-functionally, and mentor junior analysts
Candidate should have at least one SANS certification. Preferred if that is GCIH
Good understanding of basic network concepts and advantages of exposure to cloud technologies
Lateral thinking combined with excellent troubleshooting skills, preferably with experience following ITIL (Information Technology Infrastructure Library) standards
Lead team of security analysts, develop SOC standard operating procedures and develop Threat Intel feeds such as MISP
Company
LogicalisUS
We are Architects of Change. We help organizations succeed in a digital-first world.
H1B Sponsorship
LogicalisUS has a track record of offering H1B sponsorships. Please note that this does not
guarantee sponsorship for this specific role. Below presents additional info for your
reference. (Data Powered by US Department of Labor)
Distribution of Different Job Fields Receiving Sponsorship
Represents job field similar to this job
Trends of Total Sponsorships
2025 (5)
2024 (4)
2023 (6)
2022 (3)
2021 (3)
2020 (5)
Funding
Current Stage
Late StageLeadership Team
Recent News
2025-09-19
2025-09-12
Company data provided by crunchbase