XDR ANALYST LEVEL 2 - CYBER SECURITY (THREAT HUNTER)
*Note that this is not a sponsorship opportunity
APPLICANTS NEED TO BE BASED IN LOS ANGELES TO BE CONSIDERED.
Description
We are on the lookout for exceptional Threat Analysts and Hunters to join our forward-thinking cybersecurity firm. If you're driven to outsmart cyber adversaries and have a knack for analysis, we would love to hear from you.
As a Level 2 XDR analyst, you'll play a crucial role in a dedicated cybersecurity team, leveraging the 'Safe Platform' to safeguard a vast network of businesses. You'll need a solid foundation in threat analysis, threat intelligence and detection engineering, plus a creative edge to spot emerging cyber threats and vulnerabilities.
Your core responsibility will be to use threat signals and threat hunting, along with automation, to identify and counteract threat actors within enterprise networks. You'll also provide actionable advice to neutralize threats. As an L2 XDR Analyst, you'll draw on data analysis, cyber threat intelligence and cutting-edge security technologies to achieve this goal.
Location / Work arrangement
United States – West Coast Area / Fully Remote - preference will be given to those residing in Los Angeles
Technology snapshot
· Microsoft Sentinel
· Microsoft Defender suite
· EDR technologies: Microsoft Defender for Endpoint, Crowdstrike
Level of professional experience
· Excellent familiarity with the current Threat Landscape and Cyber Attack Methodologies
· Proven experience in SIEM and EDR based threat analysis and responding to cyber
security incidents
· Proven experience in Microsoft Sentinel analytics engineering and KQL
· Proven experience in cyber threat intelligence
· Proven customer facing experience
Minimum level of education and work experience
· 3+ years’ work experience in one of the following security areas: CSOC Analyst, Threat
Analyst, Incident Response
· 2+ years’ experience with either security log analysis, security analytics, EDR, Sysmon and
SIEM
· 2+ years’ work experience in Scripting/Programming language
· A relevant college qualification, an advantage
· Experience working with security APIs, an advantage
· Database SQL and NoSQL platforms (Hive, MSSQL, MongoDB, Elastic), an advantage
· SANS Certifications (GCIA, GCIH, GREM, GCFA) or other industry certifications (CISSP,
CISM, CISA, CEH, CHFI), an advantage
Key competencies
· Passionate about Cyber Security
· Curious, innovative, and forward thinking
· Self-sufficient and project leadership skills
· Problem solving skills
· Seeking continual efficiencies
· High attention to detail with a passion for accuracy and quality technical documentation
· Agile and strong organisational skills to manage a varied workload
· Excellent written and verbal communication skills
Key performance areas
· Quality threat hunting, threat intelligence, analysis, and incident response
· Documentation, automation, and streamlined integration
· Technical guidance, coaching and self-development
If you are interested in applying, please submit your detailed CV highlighting how your skills meet the full requirements as set out in this specification to Lyn.schmalzried@performanta.com. Only applicants who meet the exact criteria will be considered. Please note that this is not a sponsorship opportunity.
Job Types: Full-time, Permanent
Pay: From $8,500.00 per month
Experience level:
Schedule:
Experience:
- SOC Analyst/Threat Hunter/MDR: 3 years (Required)
Work Location: Hybrid remote in Los Angeles, CA 90071