- Search jobs
- Manchester, NH
- cyber security analyst
Cyber security analyst Jobs in Manchester, NH
Create a job alert for this search
Cyber security analyst • manchester nh
Remote Cyber Security Experts - AI Trainer ($85-$95 per hour)
MercorManchester, New Hampshire, USSecurity Coordinator
New SeasonMANCHESTER, NH, USProduct Analyst
Blue Ribbon Global TechnologiesMerrimack, NH, United States- Promoted
Mgr II- Security
BAE Systems USAMerrimack, NH, United StatesBenefit Technology Implementation Analyst
5HB Hub International New England, LLCManchester, NHProduct Analyst
SOMERSET STAFFINGMerrimack, NH, United StatesUnarmed Security Officer
Metro One Loss Prevention Services Group IncManchester, USBoard Certified Behavior Analyst (BCBA)
Achieving Stars TherapyManchester, NHPrinciple Cyber Security Engineer
Fidelity InvestmentsMerrimack, NH, USProduct Analyst
Relig Staffing, Inc.Merrimack, NH, United StatesSenior IT Data Analyst
Piper CompaniesMerrimack, New HampshireCyber Operations Specialist (ARMY)
U.S. ArmyManchester, New Hampshire, United States- Promoted
INTELLIGENCE ANALYST
US ArmyManchester, NH, United StatesAI Data Analyst
MaximusManchester, NH, USClaims Analyst [Direct]
Compre GroupManchester, New Hampshire, USBoard Certified Behavior Analyst
Birch AcademyManchester, NHRemote Product Quality Analyst - $45 per hour
Great LionManchester, New HampshireCollections Analyst II
Coca-Cola NortheastBedford, NH, NH, USProcess Improvement Analyst II
Insurance Office of AmericaManchester, NH, US- information security (from $ 180,913 to $ 246,400 year)
- front end engineer (from $ 235,175 to $ 246,400 year)
- software engineering manager (from $ 207,494 to $ 246,400 year)
- solutions architect (from $ 130,000 to $ 246,400 year)
- researcher (from $ 36,563 to $ 246,250 year)
- hospital (from $ 41,995 to $ 245,000 year)
- security manager (from $ 151,573 to $ 240,788 year)
- model (from $ 149,050 to $ 223,950 year)
- data engineer (from $ 133,000 to $ 211,350 year)
- Fort Worth, TX (from $ 112,500 to $ 195,750 year)
- Washington, DC (from $ 97,964 to $ 185,250 year)
- Miami, FL (from $ 84,975 to $ 185,250 year)
- Seattle, WA (from $ 105,063 to $ 170,250 year)
- San Francisco, CA (from $ 103,000 to $ 165,958 year)
- Alexandria, VA (from $ 103,697 to $ 162,423 year)
- Phoenix, AZ (from $ 100,003 to $ 156,000 year)
- Columbus, OH (from $ 86,500 to $ 155,250 year)
- Los Angeles, CA (from $ 103,000 to $ 155,000 year)
- San Jose, CA (from $ 99,511 to $ 152,544 year)
The average salary range is between $ 89,895 and $ 145,754 year , with the average salary hovering around $ 110,109 year .
Related searches
Remote Cyber Security Experts - AI Trainer ($85-$95 per hour)
MercorManchester, New Hampshire, US- Full-time
- Remote
Mercor is recruiting on behalf of a cutting-edge AI research lab building advanced AI systems for cybersecurity applications. We are seeking senior cybersecurity professionals with deep hands-on experience across both defensive (Blue Team) and offensive (Red Team) security disciplines. In this role, you will apply real-world adversarial and defensive expertise to evaluate, stress-test, and improve AI models designed to assist with threat detection, incident response, and attack simulation. Your insights will directly inform how AI systems reason about attacks, evasions, detection logic, and response workflows. This is a flexible, remote engagement ideal for experienced practitioners who have operated in enterprise, consulting, or high-security environments.
- Key Responsibilities ### Defensive (Blue Team) Contributions - Investigate and analyse real or simulated security incidents (e.g., phishing, lateral movement, ransomware, privilege escalation). - Review logs and telemetry from SIEM, EDR / XDR, firewall, cloud, and identity systems. - Apply frameworks such as MITRE ATTACK to classify adversary behavior. - Evaluate alert quality, detection rules, triage decisions, and response workflows. - Assess AI-generated investigations for technical correctness and operational realism. ### Offensive (Red Team) Contributions - Analyse attack chains including initial access, persistence, privilege escalation, lateral movement, and data exfiltration. - Simulate adversarial thinking to evaluate detection gaps and bypass techniques. - Review exploit techniques, payload behaviors, and evasion strategies. - Provide insights into attack surface analysis and real-world adversary tactics. - Stress-test AI systems against realistic red-team scenarios. ### AI Evaluation & Feedback - Provide structured reasoning explaining investigative and adversarial decisions. - Identify weaknesses in AI threat analysis and suggest improvements. - Help refine benchmarks for detection, triage, and attack simulation accuracy. * * * ## Requirements ### Experience - 5+ years in cybersecurity with experience in one or more of : - SOC Analyst (Level II / III) - Incident Responder - Detection Engineer - Threat Hunter - Red Team Operator / Penetration Tester - Security Consultant (Offensive Security) - Hands-on experience conducting or responding to real-world security incidents. * * * ### Technical Skills – Blue Team - Strong experience with : - SIEM platforms (Splunk, Sentinel, QRadar, Elastic) - EDR / XDR tools (CrowdStrike, Defender, Carbon Black) - Log analysis and event correlation - Network traffic analysis (Wireshark, Zeek, tcpdump) - Cloud security and IAM investigation experience preferred. - Familiarity with MITRE ATT&CK mapping and detection engineering. * * * ### Technical Skills – Red Team - Experience with : - Penetration testing methodologies - Adversary emulation and attack simulation - Exploitation frameworks (e.g., Metasploit, Cobalt Strike or equivalents) - Privilege escalation techniques - Lateral movement techniques - Evasion and obfuscation methods - Understanding of Active Directory attacks, phishing frameworks, and payload development is a plus. * * * ### Analytical & Communication Skills - Strong written documentation skills explaining technical reasoning. - Ability to think from both attacker and defender perspectives. - Structured, logical analysis of complex security scenarios. * * * ### Preferred Qualifications - Certifications such as : - OSCP, OSEP, CRTO (Red Team) - GCIA, GCFA, GCIH (Blue Team) - CISSP - Experience mentoring junior analysts or red team members. - Scripting proficiency (Python, PowerShell, Bash). * * * ## Why Join - Contribute to next-generation AI systems for cybersecurity. - Work at the intersection of offensive and defensive security research. - High-impact role shaping AI reasoning about real-world cyber threats. - Flexible engagement suited for senior practitioners. - Collaborate with leading AI researchers and security experts.