Please, let Cyderes know you found this job
on RemoteYeah.
This helps us grow 🌱.
Description:
The Managed Services Principal Security Analyst is responsible for providing security solutions for clients.
This role requires the ability to consistently meet and exceed client expectations while representing and reinforcing the Cyderes brand through positive interactions with other teams.
It is a customer-facing position that involves strategic advisory, deep-dive analysis, and creating custom security content for managed service customers.
Responsibilities include taking ownership of positive security outcomes for a designated set of customers.
The analyst will provide guidance, instruction, mentorship, and leadership to other Security Analysts.
They will drive customer cadence calls and act as a trusted advisor to customers.
The role involves developing custom dashboards and reports for regular customer status updates.
Ensuring the quality of SOC deliverables to the Principal Analyst’s customers is essential.
The analyst will perform Threat Hunting on customer networks to detect and isolate threats, providing recommendations.
Proactive security investigations and searches on client environments to detect malicious activities are required.
The position demands expert-level strategic analysis of customer security posture, risk level, and security data.
Updating documentation and runbooks to ensure repeatable analysis is necessary.
The analyst will advise Detection Engineering, Automation Engineering, and Telemetry Engineering on technology improvements to close gaps in customer security posture.
Documenting and communicating recommendations and guidelines based on analysis results is part of the role.
Maintaining current knowledge and understanding of the threat landscape is crucial.
Requirements:
Candidates must have 3 or more years of progressing/in-depth IT security experience, with practical experience in a senior role within the last three years.
System Administration experience in Windows, Unix/Linux, and Mac is required.
An advanced understanding of networking concepts and the ability to analyze network artifacts is necessary.
Demonstrated experience in using Endpoint Detection and Response software such as SentinelOne, Crowdstrike, or Defender is essential.
Candidates should have advanced knowledge of at least one leading SIEM platform, including Sentinel, Splunk, Elastic, IBM Qradar, or Chronicle.
Possession of at least one industry certification such as Sec+, CEH, or SANS Certification (e.g., GCIH, GCIA, GSEC, GMON) is required, or candidates should be working towards a related certification.
Prior knowledge of SOAR platforms such as Siemplify or Forti soar is preferred.
Basic scripting or development experience in languages like Python, JavaScript, PowerShell, or bash is necessary.
Exceptional written and verbal communication skills are required.
Candidates must demonstrate expert knowledge of the MITRE ATT&CK framework.
Benefits:
Cyderes is an Equal Opportunity Employer (EOE), ensuring qualified applicants are considered for employment without discrimination.
The company values a diverse workforce and encourages applicants from all backgrounds to apply.
Note that this job posting is intended for direct applicants only, and outside recruiters are requested not to contact regarding this position.
Apply now
Please, let Cyderes know you found this job
on RemoteYeah
.
This helps us grow 🌱.