Information Security Analyst

SRS DistributionMcKinney, TX
Onsite

About The Position

The Cybersecurity Analyst role at company is pivotal in fortifying the cybersecurity posture of our business customers through expert management of SOC Level 3 activities and comprehensive email hygiene practices. The position entails conducting advanced threat investigations, refining threat detection mechanisms, and ensuring robust incident response capabilities to prevent and address cyber threats. By proactively managing the organization's digital footprint and collaborating with threat intelligence teams, the successful candidate will play a crucial role in mitigating risks and safeguarding the company's information assets in cyberspace.

Requirements

  • Bachelor’s degree in Cybersecurity, Computer Science, or a related field, or equivalent professional experience.
  • Demonstrable experience in managing advanced cyber incidents and supporting Incident Response (IR) teams.
  • Robust understanding of email security protocols, including SPF, DKIM, and DMARC.
  • Proficiency in email security platforms such as Proofpoint, Mimecast, or Microsoft Defender.
  • Expertise in analyzing and interpreting security threats and patterns.
  • Strong analytical thinking and problem-solving abilities, capable of addressing complex cybersecurity challenges.
  • Strong communication skills, with the capacity to articulate technical concepts effectively to non-technical stakeholders.
  • Ability to collaborate efficiently within a team as well as independently tackle intricate problems.
  • Minimum of three years of relevant work experience in cybersecurity analysis, with demonstrated expertise in handling advanced cyber incidents and integrating threat intelligence into operational workflows.

Nice To Haves

  • Possession of industry-recognized certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or Certified Information Security Manager (CISM) which demonstrate proficiency in the field of cybersecurity.
  • Proven track record of effectively integrating threat intelligence data into security operations to enhance the organization’s proactive threat detection and response strategies.
  • Extensive experience in configuring and optimizing leading SIEM platforms, such as Splunk, ArcSight, or QRadar, for advanced threat analytics and comprehensive security visibility.
  • Competence in writing scripts in languages such as Python, PowerShell, or Bash to automate repetitive tasks, streamline security operations, and enhance incident response efficiencies.
  • Demonstrated ability to analyze and respond to sophisticated APTs, employing both strategic and tactical measures to safeguard enterprise environments against complex cyber threats.
  • Familiarity with securing cloud platforms (e.g., AWS, Azure, Google Cloud) and understanding cloud-native security tools and practices to protect sensitive data and maintain regulatory compliance.
  • Ability to lead and execute cybersecurity projects that involve cross-functional teams, managing resources and timelines efficiently to achieve strategic security objectives.
  • Ability to synthesize complex datasets and threat information, enabling timely decision-making that mitigates risks and enhances the security posture of the organization.
  • An advanced degree in Cybersecurity, Information Technology, or a closely related discipline is highly valued, further enhancing capabilities in threat detection and digital footprint management.
  • Certified Information Systems Security Professional (CISSP)
  • Certified Information Security Manager (CISM)
  • Certified Ethical Hacker (CEH)
  • GIAC Certified Incident Handler (GCIH)

Responsibilities

  • Lead Level 3 SOC escalations by performing comprehensive investigations of advanced cybersecurity threats, alerts, and incidents to enhance the company’s threat response capabilities.
  • Develop and optimize Security Information and Event Management (SIEM) rules, playbooks, and threat detection mechanisms to improve proactive monitoring and defense strategies across the organization’s networks.
  • Conduct thorough root cause analyses of critical security incidents, offering data-driven recommendations to prevent recurrence and strengthen the organization’s overall security posture.
  • Support incident response activities through effective containment, eradication, and recovery efforts, ensuring rapid and efficient resolution of cybersecurity incidents.
  • Manage and enhance email security platforms to safeguard against phishing, malware, and advanced cyber threats, implementing preventative measures and optimizing email hygiene practices.
  • Monitor and mitigate the organization’s digital footprint in cyberspace, identifying potential vulnerabilities and threats from external sources, including social media and the dark web.
  • Collaborate with cross-functional teams, including threat intelligence and incident response units, to incorporate relevant threat data into operational workflows and improve collective security measures.
  • Work with stakeholders to address risks associated with exposed or sensitive data in public-facing domains, ensuring proactive measures are in place to protect against data exploitation.

Benefits

  • Competitive weekly/bi-weekly pay
  • discretionary bonuses
  • 401(k) with company match
  • Employee Stock Purchase Plan
  • paid time off (vacation, sick, volunteer, holidays, birthday, floating)
  • medical/dental/vision
  • flexible spending accounts
  • company-paid life and short-term disability
  • optional long-term disability
  • additional life insurance
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service