Security Analyst II - SOC Operations
We help the world Be Everyday Ready™ Today’s threatscape is relentless. So are we. At Cyderes, we specialize in building practical IAM, exposure management, and risk programs, and stopping active threats fast with MDR that works with your existing security tools — all augmented by AI and driven by seasoned operators. Our tireless global team is laser-focused on cybersecurity, arming organizations with the people, platforms, and perspectives they need to conquer whatever tomorrow throws their way. About the Role: The Managed Services Security Analyst II is responsible for security solutions for clients. The Security Analyst II will demonstrate the capacity to consistently meet and exceed client expectations representing and reinforcing the Cyderes brand through positive interaction with other teams within the company. Perform deep dive investigations into security threats, understand and implement MITRE mapping to identify customers current security posture. Responsibilities: • Perform triage and advanced analysis tasks across endpoint, server, and network infrastructure. • Perform Threat Hunting on customer networks to detect, isolate threats and provide recommendations. • Provide proactive security investigation and searches on client environment to detect malicious activities. • Coordinate Incident investigations and deep dive analysis on detected threats. • Understand and identify indicators of attack and compromise in alerts, by hunting through data, and from review of investigation notes. • Have full understanding of the MITRE ATT&CK framework. Mapping clients use cases to tactics and techniques. • Update documentation and runbooks to ensure repeatable analysis. • Actively participate in an after-hours on-call rotation as Incident Controller • Scope customer security incidents Requirements: • 3 or more years of progressing/in-depth IT security experience. • System Administration experience (Windows, Unix/Linux, Mac) • Advanced understanding of networking concepts and ability to analyze network artifacts. • Demonstrate experience in using Endpoint Detection and Response software (Sentinel1, Crowdstrike, Defender ETC.) • Advanced knowledge of at least one leading SIEM platform (Sentinel, Splunk, Elastic, IBM Qradar, Chronicle etc.) • Possess at least one industry certification Sec+, CEH, SANS Certification (e.g. GCIH, GCIA, GSEC, GMON), OSCP etc. or working towards a related certification. • Basic scripting or development experience in one of the following languages: Python, JavaScript, PowerShell, bash, etc. Cyderes is an Equal Opportunity Employer (EOE). Qualified applicants are considered for employment without regard to race, religion, color, sex, age, disability, sexual orientation, genetic information, national origin, or veteran status. Note: This job posting is intended for direct applicants only. We request that outside recruiters do not contact us regarding this position. We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us. Apply tot his job