Senior MDR Analyst (M-F 12 PM - 8 PM ET) @ Blackpoint Cyber | Jobright.ai
JOBSarrow
RecommendedLiked
0
Applied
0
External
0
Senior MDR Analyst (M-F 12 PM - 8 PM ET) jobs in United States
Be an early applicantLess than 25 applicants
company-logo

Blackpoint Cyber · 15 hours ago

Senior MDR Analyst (M-F 12 PM - 8 PM ET)

ftfMaximize your interview chances
ComputerCyber Security
check
Comp. & Benefits

Insider Connection @Blackpoint Cyber

Discover valuable connections within the company who might provide insights and potential referrals.
Get 3x more responses when you reach out via email instead of LinkedIn.

Responsibilities

Analyze and evaluate anomalous network and system events in a 24x7x365 Security Operation Center (SOC) environment via conducting lead-less threat hunting.
Collaborate with MDR Analysts to research and investigate emerging cyber security threats; become an escalation point of contact for advanced intrusion analysis.
Develop Incident analysis reports and work across business units and customers to bring issues to a close.
Help design and build operational processes and procedures to improve overall SOC efficiency.
Provide actionable threat and vulnerability analysis based on security events for many independent customer environments.
Build test lab environments to research emerging techniques and make contributions to the internal and external knowledge development of threat operations.
Review sandbox technologies for additional IOCs uncovered from artifacts uncovered during analysis.

Qualification

Find out how your skills align with this job's requirements. If anything seems off, you can easily click on the tags to select or unselect skills to reflect your actual expertise.

Information Security ExperienceSecurity Operations Center (SOC)Endpoint Event TriagingThreat Indicator AssessmentWindows/Linux/OSX KnowledgeELK Stack FamiliarityScripting with PowershellScripting with PythonScripting with GoAWS Services EC2AWS Services S3AWS Services IAMAzure/M365 FamiliarityLeadless Threat Hunting AnalysisNetwork/System AdministrationDigital Forensics ExperienceMalware AnalysisPentesting/Red/Blue TeamCapture The Flag (CTF) DevelopmentCritical Thinking Skills

Required

Five (5+) years of experience in an information security role. Progressive relevant training and/or certification may be substituted for one (1) year of the experience requirement
Experience working in a Security Operations Center (SOC)
Two (2+) years of experience with triaging endpoint events from EDR, NGAV, and supporting the Incident Response (IR) process
Deep knowledge on assessing threat indicators in a Windows Environment (e.g. Malware/Malicious Anomalies/Abnormal network Activity/Root Level Compromise, Forensic Artifacts, etc.)
Robust understanding of at least two of the following: Windows, Linux or OSX
Familiarity with ELK stack (Dashboards, Logstash Config, Searching) Scripting / Programming with Powershell, Python, and Go
Familiarity with AWS services such as EC2, S3 and IAM and Azure/M365
Experience in developing, refining, and performing leadless threat hunting analysis to uncover new or potential incidents and report on results
Excellent problem solving, critical thinking, and analytical skills with the ability to deconstruct issues (hunting anomalous pattern detection)
Excellent written and verbal communication skills to effectively summarize and present technical findings to both technical and non-technical audiences

Preferred

Bachelor’s Degree in Computer Science or related technical discipline
Network/System Administration and/or Engineering
Deep forensic knowledge of Windows, Mac OS and/or Linux
Experience in Digital Forensics and Incident Response a plus
Malware Analysis (Behavioral and/or Static analysis- IDA, Cuckoo Sandbox, x86/x64 Debugging) Pentesting/Red/Blue Team
Capture The Flag (CTF) Development

Benefits

Health, Vision, Dental, and Life Insurance plans
Robust 401k plan
Discretionary Time Off
Other minor perks

Company

Blackpoint Cyber

twittertwittertwitter
company-logo
Blackpoint Cyber is a provider of cybersecurity threat hunting, detection, and response technology.

Funding

Current Stage
Growth Stage
Total Funding
$201.4M
Key Investors
Bain Capital Tech OpportunitiesWP Global Partners
2023-06-08Series C· $190M
2022-05-20Series B
2020-07-08Series B· $5.4M

Leadership Team

J
Jon Murchison
CEO & Founder
linkedin
leader-logo
Manoj Srivastava
Chief Technology and Product Officer
linkedin
Company data provided by crunchbase
logo

Orion

Your AI Copilot