Cybersecurity Analyst II
Role details
Job location
Tech stack
Job description
Are you driven to detect, analyze, and stop emerging cyber threats before they impact the business? As a Cybersecurity Analyst II, you will play a critical role in safeguarding the Firm's technology environment by monitoring, triaging, and responding to security incidents across enterprise systems. In this position, you'll analyze threat intelligence, conduct proactive threat hunting, and collaborate closely with internal technology and security teams to strengthen detection capabilities across our security platforms-including Security Information and Event Management (SIEM) and Endpoint Detection and Response (EDR) tools. You'll serve as a trusted resource during incident response efforts while helping continuously enhance our Information Security Program.
- Incident Monitoring & Response - Monitor, triage, and respond to security alerts and incidents across enterprise systems, ensuring timely containment, investigation, and resolution.
- Threat Intelligence & Hunting - Leverage threat intelligence feeds to stay ahead of emerging risks and conduct proactive threat hunting to identify potential vulnerabilities.
- Detection Engineering - Develop, implement, and refine detection rules within SIEM and EDR platforms to strengthen monitoring capabilities and reduce risk exposure.
- Security Tool Management - Configure, maintain, and optimize security technologies to ensure effective performance and coverage.
- Cross-Functional Collaboration - Partner with IT and infrastructure teams to promote secure system configurations and support remediation efforts.
- Subject Matter Expertise - Act as a subject matter expert during security incident responses, providing guidance and technical insight.
- Process & Documentation Excellence - Document and maintain incident response and monitoring processes to ensure consistency, compliance, and continuous improvement.
- Program Advancement - Contribute to strengthening the organization's Information Security Program by identifying opportunities to enhance protection, efficiency, and awareness.
- Knowledge Sharing & Continuous Improvement - Collaborate with fellow analysts and engineers to share insights, improve workflows, and develop efficient, scalable solutions.
Requirements
- Education - Bachelor's degree preferred, ideally in Cybersecurity, Information Technology, or a related field (or equivalent experience).
- Experience - At least six years of experience in an information technology-related field or a minimum of three years of direct cybersecurity experience.
- Endpoint & Operating System Expertise - Strong knowledge of endpoint security technologies and Windows operating systems.
- Cloud Security Knowledge - Experience securing cloud environments, particularly within Microsoft Azure.
- Security Platform Experience - Hands-on experience with Endpoint Detection and Response (EDR) solutions such as CrowdStrike, Microsoft Defender for Endpoint (MDE), or SentinelOne.
- SIEM & Log Analysis - Experience working with Security Information and Event Management (SIEM) platforms such as Microsoft Sentinel, LogRhythm, Google Security Operations (SecOps), Splunk, or Exabeam, including event analysis, log management, alert generation, investigations, and reporting.
- Advanced Security Technologies - Experience with Security Orchestration, Automation, and Response (SOAR) platforms, as well as intrusion detection/prevention systems, firewalls, content filtering technologies, vulnerability management solutions, web proxies, Data Loss Prevention (DLP), and Cloud Access Security Brokers (CASB).
- Microsoft Proficiency - Proficiency in Microsoft Outlook, Word, and Excel.
- Certifications - Relevant certifications such as CompTIA Security+, Global Information Assurance Certification (GIAC) Information Security Fundamentals or Security Essentials, or Certified Information Systems Security Professional (CISSP) preferred.