Position Overview
The Cybersecurity Analyst is responsible for safeguarding organizational systems and data by detecting, analyzing, and responding to cybersecurity threats. This role requires hands-on expertise in security and log analysis, incident response, and triage, as well as experience with Trellix solutions, PCI DSS assessments, and SIEM platforms such as Helix, SolarWinds, and Splunk. Familiarity with NIST 800-53 and NIST 800-35 frameworks is essential.
This position also requires a foundational understanding of IT infrastructure, as the analyst will closely partner with the Infrastructure team to ensure end-to-end system security.
Key Responsibilities
- Conduct real-time security monitoring and log analysis to identify potential threats and anomalies.
- Perform incident response activities including triage, investigation, containment, eradication, and recovery.
- Manage and tune SIEM platforms (Helix, SolarWinds, Splunk) to ensure effective event correlation and alert accuracy.
- Utilize Trellix security solutions (e.g., ETP, EDR, Helix) for threat detection, response, and endpoint protection.
- Conduct PCI DSS assessments and support remediation to ensure compliance with regulatory and industry standards.
- Develop and maintain incident response plans, playbooks, and post-incident reporting in alignment with NIST 800-53 / 800-35.
- Perform root cause analysis and recommend proactive measures to reduce risk exposure.
- Collaborate with cross-functional IT and Infrastructure teams to improve the organizations overall security posture.
- Participate in a rotational weekly on-call schedule to support after-hours IT support and security.
- Create detailed reports and metrics on incidents, vulnerabilities, and compliance performance.
- Stay current on evolving threat landscapes, tools, and cybersecurity frameworks.
Required Skills and Qualifications
Bachelors degree in Cybersecurity, Computer Science, Information Technology, or equivalent experience.Proven experience in incident response, security operations, and log analysis.Hands-on experience with Trellix (McAfee) products and other EDR / SIEM solutions.Proficiency in Helix, SolarWinds, and Splunk for monitoring, correlation, and threat hunting.Experience performing or supporting PCI DSS audits and compliance efforts.Solid understanding of NIST SP 800-53 and NIST SP 800-35 frameworks.Strong analytical, troubleshooting, and communication skills.IT infrastructure background with the ability to collaborate effectively with system administrators and network engineers.Ability to lift up to 50 lbs as part of occasional equipment handling or system maintenance tasks.Ability to work in a fast-paced environment and respond effectively under pressure.Preferred Qualifications
Security certifications such as CompTIA Security+, CISSP, CISM, CEH, or GCIH.Previous experience in a Security Operations Center (SOC) environment.Familiarity with scripting (Python, PowerShell, Bash) for automation and log parsing.Knowledge of vulnerability management and threat intelligence platforms.