Cybersecurity Analyst - Hybrid

A.C. CoyCranberry Township, PA
1dHybrid

About The Position

A.C.Coy is currently seeking candidates for a Cybersecurity Analyst role. This individual will be responsible for safeguarding the organization’s information systems, networks, and data against cyber threats This role involves monitoring security events, analyzing vulnerabilities, responding to incidents, implementing security controls, and ensuring compliance with applicable regulations and best practices.

Requirements

  • 2+ years of directly applicable experience in cybersecurity or IT security operations
  • Experience with SIEM platforms (e.g., Rapid7, Splunk, Sentinel)
  • Experience with vulnerability management tools (e.g., InsightVM, Nessus, Qualys)
  • Willingness and a strong desire to learn new IT Security technologies
  • A commitment to assist with off-hours IT Security emergencies, if needed; no on-call is required

Nice To Haves

  • Hands-on experience with CrowdStrike, Rapid 7, X Shield, Cisco Umbrella, Cisco Duo
  • Strong understanding of Networks/systems
  • Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or a related field

Responsibilities

  • Monitor security tools including SIEM, EDR, IDS/IPS, firewalls, and cloud security platforms
  • Analyze alerts and events to identify potential threats and security incidents
  • Participate in incident detection, containment, eradication, and recovery processes
  • Perform vulnerability scans and analyze results to prioritize remediation
  • Assist in conducting risk assessments and security audits
  • Support configuration and maintenance of security technologies
  • Maintain incident documentation, dashboards, and reports
  • Support security awareness initiatives and training
  • Review and correlate security logs
  • Follow up on remediation activities to ensure they are being executed and inform management of any significant delays in addressing gaps
  • Utilize subject matter knowledge in industry leading security solutions and best practices to implement one or more components of information security such as availability, integrity, confidentiality, risk management, threat identification, modeling, monitoring, incident response, access management, and business continuity
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service