Full-Time Senior Cyber Threat Analyst
MasterBrand Cabinets LLC is hiring a remote Full-Time Senior Cyber Threat Analyst. The career level for this job opening is Senior Manager and is accepting US based applicants remotely. Read complete job description before applying.
MasterBrand Cabinets LLC
Job Title
Posted
Career Level
Career Level
Locations Accepted
Share
Job Details
We are looking for a skilled and self-motivated senior analyst to join our team and lead efforts in protecting the organization’s digital assets.
This role involves identifying, analyzing, and mitigating cyber threats, conducting threat intelligence research, monitoring security tools, and collaborating with various teams to safeguard our company.
The analyst will also be responsible for promptly and effectively responding to security incidents, taking the initiative to remediate any risks uncovered during investigations, and effectively communicating these actions at various organizational levels.
- Manage threat intelligence to stay ahead of emerging cyber threats, including researching threats, updating security tools with newly discovered IOCs, and working with the vulnerability manager.
- Assist in developing and implementing security measures to mitigate identified threats.
- Analyze logs and monitor security tools (SIEM, EDR platform, E-mail protection, etc.) for unusual activity, potential threats, and other risks to the company.
- Lead assessments and validation testing to identify security weaknesses and ensure the proper functionality of the security tools.
- Quickly investigate and respond to security incidents, including malware infections, data breaches, phishing activity, and unauthorized access.
- Participate in the improvement of the organization’s incident response plan.
- Present findings clearly and concisely, tailored to both executives and advanced technical personnel.
- Prepare detailed reports on security incident findings and recommend corrective actions, including collaborating with the MSSP on tuning efforts to reduce false positives.
- Proactively address secondary findings to eliminate risk.
- Collaborate with IT and other departments to ensure security policies and procedures are followed.
- Develop and follow runbooks for event handling, incident response, and the investigative processes.
- Provide guidance and training to other analysts and staff on cybersecurity best practices.
- Self-manage assigned projects to completion with little oversight.
Requirements:
- Bachelor’s degree in computer science, Information Technology, Cybersecurity, or a related field.
- Minimum of 7 years of experience in cybersecurity, with a focus on threat analysis and incident response.
- Strong knowledge of cybersecurity Incident response lifecycle.
- Experience in developing and following security and investigative processes.
- Proficiency in using security tools and technologies (e.g., SIEM, IDS/IPS, firewalls)
- Strong background in Microsoft Sentinel and its query language is required.
- Preferably experience with KnowBe4, MS Defender, Proofpoint, and Crowdstrike
- Excellent analytical, documentation, and problem-solving skills.
- Strong communication and interpersonal skills
- Ability to learn from mistakes and apply investigative processes to tasks beyond predefined steps