OI - Ssr. Cybersecurity Analyst - Job7104

Multiple Countries
Full Time
Mid Level

OI - Ssr. Cybersecurity Analyst - Job7104

Summary

We are seeking an early-to-mid career Cybersecurity Analyst focused on incident response, IOC triage, and threat hunting. This role is central to detecting, analyzing, and responding to security alerts across endpoints, firewalls, privileged access, and email security platforms.

The position offers hands-on work with CyberArk PAM, Palo Alto Cortex XDR, Abnormal AI, and Microsoft Defender (MDE, MDI, MDA), plus SIEM-driven investigations. It is an opportunity to develop advanced IR and threat hunting skills while collaborating across IT, Security, Legal, and business teams.

Responsibilities

  • Triage and respond to alerts from Palo Alto Cortex XDR, Microsoft Defender (MDE, MDI, MDA), Abnormal AI, and other monitored platforms.
  • Validate IOCs, follow playbooks, escalate incidents, and coordinate remediation activities.
  • Hunt proactively for malicious activity and compromise patterns across endpoints, privileged accounts, and email systems.
  • Use and manage CyberArk PAM to investigate suspicious privileged account activity and provide secure remote access to partners.
  • Analyze reported phishing attempts and manage email security measures and awareness support.
  • Query and correlate logs in SIEM to enrich investigations and support containment and eradication.
  • Collaborate with IT, Security, Legal, and business teams during incident response and remediation efforts.
  • Support the compliance team with vendor cyber risk findings remediation (Panorays) as needed.

Requirements

  • Bachelor’s degree in Computer Science, Cybersecurity, or equivalent experience.
  • 3+ years of experience in cybersecurity with direct exposure to incident response, IOC triage, and security monitoring.
  • Hands-on experience with CyberArk PAM.
  • Hands-on experience with Palo Alto Cortex XDR.
  • Hands-on experience with Microsoft Defender suite (Defender for Endpoint, Defender for Identity).
  • Experience using email security platforms such as Abnormal AI.
  • Experience using SIEM technologies to query, correlate, and enrich investigations (KQL/SPL referenced in context).
  • Strong analytical skills to evaluate and prioritize incident response activities.
  • Excellent communication skills and ability to collaborate across teams.

Nice to Have

  • Advanced incident response and handling complex security events.
  • Relevant certifications such as CISSP, CEH, CySA+, or vendor-specific certifications (CyberArk, Palo Alto, Microsoft).
  • Familiarity with regulatory requirements and industry standards (ISO 27001, NIST CSF, DFARS/CMMC).
  • Operational CyberArk PAM experience (~2 years) and extensive Palo Alto Cortex XDR experience (~7 years) as notable strengths.
Share

Apply for this position

Required*
We've received your resume. Click here to update it.
Attach resume as .pdf, .doc, .docx, .odt, .txt, or .rtf (limit 5MB) or Paste resume

Paste your resume here or Attach resume file

Human Check*