Security Operations Analyst, MDR @ NuHarbor Security | Jobright.ai
JOBSarrow
RecommendedLiked
0
Applied
0
External
0
Security Operations Analyst, MDR jobs in United States
37 applicants
company-logo

NuHarbor Security · 17 hours ago

Security Operations Analyst, MDR

ftfMaximize your interview chances
ConsultingCyber Security
check
Culture & Values

Insider Connection @NuHarbor Security

Discover valuable connections within the company who might provide insights and potential referrals.
Get 3x more responses when you reach out via email instead of LinkedIn.

Responsibilities

Provides and is an active participant in Incident Response process to support client needs.
Continually researches the cyber industry to stay up to date on current threats, threat actor's tactics and techniques, and emerging vulnerabilities.
Review analytics queries and tuning metrics to ensure assigned and working properly.
Ensures proper documentation of activities and monitors security alerts, events, and trends on behalf of clients.
Develops, implements, and improves documentation and operational processes.
Independently conducts investigations and provides actionable, context relevant, escalations and recommendations to clients.
Attends quarterly meetings and client satisfaction calls as a representative for the Analyst team.
Is responsible for ensuring Analyst portions of quarterly reports are generated to standard and on-schedule.
Proactively identifies and communicates internal and client risks.
Maintains current certifications and training to support our clients effectively.
Develops recommendations and enhancements to mature a client's cybersecurity program.

Qualification

Find out how your skills align with this job's requirements. If anything seems off, you can easily click on the tags to select or unselect skills to reflect your actual expertise.

CybersecurityIncident ResponseSIEM solutionsCrowdStrikeMicrosoft SentinelSecurity event triagingForensic analysisWindows/LinuxSecurity log designNetwork hardening methodsEndpoint conceptsBreach analysisAzure certificationsGCFA certificationGCIH certificationCEH certificationCISSP certification

Required

Bachelor's Degree and five (5) years of experience. Experience should be in a cybersecurity field and should include relevant industry certifications.
Typical Degrees: Computer Science, Information Technology, Cybersecurity, Data Analytics, Mathematics, or related field(s).
In lieu of a degree, two (2) years of experience in a related technology field and relevant industry certifications are required.
Demonstrated experience with SIEM solutions, SOC operations, executing security event triaging and tuning.
Experience working in CrowdStrike and/or Microsoft Sentinel or Defender.
Strong understanding of Incident Response phases and demonstrated experience responding to security incidents.
Demonstrated verbal and written communication skills for various internal and external audiences.
Must have an advanced understanding of, and ability to communicate, security technologies that can be used to mitigate cyber risks.
Experience and fluency in participating and leading incident response and/or forensic analysis.
Proficiency with operating systems such as Windows/Linux and related.
Deep understanding of software and systems.
Demonstrated knowledge of security log and infrastructure design.
Ability to explain simple hardening methods for network and process detections.
Familiarity with common endpoint concepts.
Ability to conduct multi-step breach and investigative analysis to trace the dynamic activities associated with advanced threats.
Ability to anticipate problems, communicate them, and resolve appropriately.
Must be a citizen of the United States.

Preferred

Bachelor's Degree and seven (7) or more years in the Information Technology field.
Holds at least one relevant industry certification (GCFA, GCIH, CEH, CISSP, etc.)
Demonstrated experience providing service to a broad range of users and experience levels.
Aptitude and desire to develop and help build new capabilities in the SOC.
Attention to detail and a methodical approach to standard operating procedures.
Ability to manage multiple concurrent objectives or activities, and effectively make judgments.
Understanding of common network services and attacks against them.
Experience identifying gaps within security control architecture.
Technical experience in cybersecurity field preferred.
Holds Azure certifications (AZ-500, AZ-700, AZ-305).
Holds a CrowdClass Sales Engineering Certification.

Benefits

Competitive salary
Paid time to give back in your community
Generous PTO

Company

NuHarbor Security

twittertwittertwitter
company-logo
NuHarbor Security is an end-to-end cybersecurity services company with a focus on best of breed security technologies.

Funding

Current Stage
Growth Stage

Leadership Team

leader-logo
Justin Fimlaid
Founder and President
linkedin
Company data provided by crunchbase
logo

Orion

Your AI Copilot