<p><span data-contrast="auto">CyberSheath Services International LLC is a rapidly growing Security and IT Managed Services Provider primarily focused on providing Cybersecurity services to the Defense Industrial Base (DIB). We are excited to be expanding our staff due to our growth and are looking to add a Cyber Security Analyst to our Security Operations team! </span><span data-ccp-props="{}"> </span></p><p><span data-contrast="auto">CyberSheath integrates compliance and threat mitigation efforts and eliminates redundant security practices that don’t improve and, in fact, may weaken an organization’s security posture. Our professionals tell clients where to stop spending, where to invest, and how to take what they are already doing and integrate it in a way that delivers improved security.  </span><span data-ccp-props="{}"> </span></p><p><span data-contrast="auto">Successful candidates for CyberSheath are self-motivated, think out of the box, work, and solve issues independently. Additionally, our most successful people are self-starters and willing to put on many hats in order to succeed. CyberSheath is fast-growing and seeks candidates who want to be part of our upward trajectory. </span><span data-ccp-props="{}"> </span></p><p><span data-contrast="auto">Job Overview </span><span data-ccp-props="{}"> </span></p><p><span data-contrast="auto">The Cyber Security Analyst will support proactive monitoring of client’s environments to detect, analyze, track, and mitigate external threats utilizing a multi-tenant security information and event management system (SIEM) and other tools used to provide managed security services. The successful candidate is well versed in numerous security technologies, understands the motivations and capabilities of Advanced Persistent Threat actors, and can communicate risks and make recommendations associated with specific network threats. This role will support the IT and Security Managed Services teams and as well as being a point of contact for security matters. </span><span data-ccp-props="{}"> </span></p><p><span data-contrast="auto">Essential Responsibilities (include but are not limited to): </span><span data-ccp-props="{}"> </span></p><ul><li data-leveltext="ï‚·" data-font="Symbol" data-listid="1" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"ï‚·","469777815":"multilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Analyze, respond, document and report on potential security incidents identified in customer environments </span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="ï‚·" data-font="Symbol" data-listid="2" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"ï‚·","469777815":"multilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Work with partners to maintain an understanding of security threats, vulnerabilities, and exploits that could impact systems, networks, and assets </span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="ï‚·" data-font="Symbol" data-listid="3" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"ï‚·","469777815":"multilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Serve as an incident coordinator for security events that require urgent response, containment, and remediation </span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="ï‚·" data-font="Symbol" data-listid="4" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"ï‚·","469777815":"multilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Develop and maintain Security tooling playbooks/runbooks </span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="ï‚·" data-font="Symbol" data-listid="5" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"ï‚·","469777815":"multilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Continuously review and optimize existing technical processes, configurations, rulesets, technologies. </span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="ï‚·" data-font="Symbol" data-listid="6" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"ï‚·","469777815":"multilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Provide analysis on various security enforcement technologies, including, but not limited to, </span><span data-contrast="auto"> </span><span data-contrast="auto">SIEM,</span><span data-contrast="auto"> </span><span data-contrast="auto">anti-virus,</span><span data-contrast="auto"> </span><span data-contrast="auto">content filtering/reporting, malware prevention, firewalls, intrusion detection systems, web application firewalls, messaging security platforms, vulnerability scanners, etc. </span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="ï‚·" data-font="Symbol" data-listid="7" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"ï‚·","469777815":"multilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Actively research current threats and attack vectors being exploited in the wild </span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="ï‚·" data-font="Symbol" data-listid="8" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"ï‚·","469777815":"multilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Actively work with associate analysts and perform investigations on escalations </span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="ï‚·" data-font="Symbol" data-listid="9" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"ï‚·","469777815":"multilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Ability to discuss security posture with multiple clients and make recommendations to better their holistic security approach </span><span data-ccp-props="{}"> </span></li></ul><p><span data-contrast="auto">Required Education, Experience, & Skills </span><span data-ccp-props="{}"> </span></p><ul><li data-leveltext="ï‚·" data-font="Symbol" data-listid="10" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"ï‚·","469777815":"multilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Minimum of 3 years’ experience in Threat Analysis and Threat Intelligence. </span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="ï‚·" data-font="Symbol" data-listid="10" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"ï‚·","469777815":"multilevel"}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">At least 2 years' experience working in a SOC</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="ï‚·" data-font="Symbol" data-listid="11" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"ï‚·","469777815":"multilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">First-hand working experience with industry-leading SIEM/SOAR tooling/providers </span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="ï‚·" data-font="Symbol" data-listid="12" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"ï‚·","469777815":"multilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Prior experience with Sumo Logic, Google Chronicle, and Azure Sentinel is a strong plus. </span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="ï‚·" data-font="Symbol" data-listid="13" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"ï‚·","469777815":"multilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Advanced understanding of query languages </span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="ï‚·" data-font="Symbol" data-listid="14" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"ï‚·","469777815":"multilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Working Kusto (KQL) knowledge is a plus. </span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="ï‚·" data-font="Symbol" data-listid="15" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"ï‚·","469777815":"multilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Networking experience (TCP/IP, Routing, RFC 1918, VPN/Zero-Trust Networking) </span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="ï‚·" data-font="Symbol" data-listid="16" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"ï‚·","469777815":"multilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Strong experience with Office 365 / Entra ID Ecosystems. </span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="ï‚·" data-font="Symbol" data-listid="17" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"ï‚·","469777815":"multilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">GCC-High Experience is a plus. </span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="ï‚·" data-font="Symbol" data-listid="18" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"ï‚·","469777815":"multilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Possesses strong troubleshooting, problem-solving, and verbal/written communication skills </span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="ï‚·" data-font="Symbol" data-listid="19" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"ï‚·","469777815":"multilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Excellent communication skills to communicate with support personnel, customers, and managers </span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="ï‚·" data-font="Symbol" data-listid="20" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"ï‚·","469777815":"multilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Demonstrated ability to work in a team environment </span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="ï‚·" data-font="Symbol" data-listid="21" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"ï‚·","469777815":"multilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Must be a U.S. Citizen and reside within the United States or its Territories </span><span data-ccp-props="{}"> </span></li></ul><p><span data-contrast="auto">Preferred Education, Experience, & Skills </span><span data-ccp-props="{}"> </span></p><ul><li data-leveltext="ï‚·" data-font="Symbol" data-listid="22" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"ï‚·","469777815":"multilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Microsoft Cloud and Security Certifications (i.e., AZ900, AZ104, SC200, SC300) </span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="ï‚·" data-font="Symbol" data-listid="23" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"ï‚·","469777815":"multilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Industry Security Certifications (CISM, CISSP, CEH, Sec+) </span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="ï‚·" data-font="Symbol" data-listid="24" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"ï‚·","469777815":"multilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Experience working in a fast-paced managed services environment (MSSP)  </span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="ï‚·" data-font="Symbol" data-listid="25" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"ï‚·","469777815":"multilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Great organizational skills to balance and prioritize work and multitask </span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="ï‚·" data-font="Symbol" data-listid="26" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"ï‚·","469777815":"multilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Great analytical and problem-solving skills to troubleshoot system problems </span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="ï‚·" data-font="Symbol" data-listid="27" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"ï‚·","469777815":"multilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Ability to work independently and remotely as part of a team </span><span data-ccp-props="{}"> </span></li></ul><p><span data-contrast="auto">Work Environment </span><span data-ccp-props="{}"> </span></p><ul><li data-leveltext="ï‚·" data-font="Symbol" data-listid="28" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"ï‚·","469777815":"multilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">CyberSheath is a fully remote organization, and this will be a work-from-home position. </span></li></ul><ul><li data-leveltext="ï‚·" data-font="Symbol" data-listid="29" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"ï‚·","469777815":"multilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Travel requirements: 0-5% yearly. </span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="ï‚·" data-font="Symbol" data-listid="26" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"ï‚·","469777815":"multilevel"}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Please note that this role is slated to work overnights: </span><span data-ccp-props="{}"> </span></li></ul><ul><li><ul><li data-leveltext="o" data-font="Courier New" data-listid="26" data-list-defn-props="{"335552541":1,"335559685":1440,"335559991":360,"469769226":"Courier New","469769242":[9675],"469777803":"left","469777804":"o","469777815":"multilevel"}" data-aria-posinset="1" data-aria-level="2"><span data-contrast="auto">Week 1 - Monday - Thursday 8pm-8am local time</span><span data-ccp-props="{}"> </span></li></ul></li></ul><ul><li><ul><li data-leveltext="o" data-font="Courier New" data-listid="26" data-list-defn-props="{"335552541":1,"335559685":1440,"335559991":360,"469769226":"Courier New","469769242":[9675],"469777803":"left","469777804":"o","469777815":"multilevel"}" data-aria-posinset="2" data-aria-level="2"><span data-contrast="auto">Week 2 - Tuesday - Thursday 8pm-8am local time </span><span data-ccp-props="{}"> </span></li></ul></li></ul><p><em><span data-contrast="auto">CyberSheath is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender identity, national origin, age, protected veteran status, among other things, or status as a qualified individual with a disability. </span></em><span data-ccp-props="{}"> </span></p><div class="content-pay-transparency"><div class="pay-input"><div class="title">Budgeted Pay Range</div><div class="pay-range"><span>$70,000</span><span class="divider">—</span><span>$85,000 USD</span></div></div></div>