Security Analyst

decryption digest • United State
Remote
Apply
AI Summary

Monitor emerging threats, analyze vulnerabilities, and provide actionable insights to support security teams. This role requires hands-on analysis, threat intelligence, and strong communication skills. Ideal for cybersecurity professionals with experience in threat analysis and vulnerability management.

Key Highlights
Monitor emerging threats and vulnerabilities
Analyze CVEs and assess real-world risk
Provide actionable insights to support security teams
Key Responsibilities
Monitor emerging threats and vulnerabilities
Analyze CVEs and assess real-world risk
Provide actionable insights to support security teams
Collaborate with researchers to validate findings
Help refine internal processes and detection logic
Technical Skills Required
CVE analysis Threat intelligence SIEM EDR Threat intel platforms Python Malware analysis Incident response
Benefits & Perks
Competitive salary
Bonus or equity potential
Fully remote work
Home office stipend
Learning and certification budget
Conference support
Health, dental, and vision coverage
Nice to Have
Experience working in a SOC, MSSP, or threat intelligence team
Familiarity with frameworks like MITRE ATT&CK
Basic scripting skills (Python or similar)
Exposure to malware analysis or incident response

Job Description


Company Description

Decryption Digest delivers real-time, high-impact analysis of critical vulnerabilities and emerging threats across the global threat landscape. We track active exploitation, ransomware activity, and infrastructure weaknesses, then turn that signal into clear, actionable intelligence. Our goal is to help security teams focus on what matters now. We prioritize speed, clarity, and real-world impact so defenders can respond faster and reduce risk with confidence.


Role Description

This is a full-time, remote role open to candidates based in the United States. As a Security Analyst, you will monitor threats, validate risk, and help translate complex security data into clear, actionable insights. You will work across threat intelligence, vulnerability analysis, and incident context to support security teams in making better decisions. This role is ideal for someone who enjoys hands-on analysis, connecting signals across sources, and understanding how threats actually impact environments.


What You’ll Do

  • Monitor emerging threats, vulnerabilities, and active exploits
  • Analyze CVEs and assess real-world risk and impact
  • Review threat intelligence and identify what is relevant to customers
  • Investigate indicators of compromise and attacker behavior
  • Support incident context and threat triage efforts
  • Produce clear summaries and reports for technical and non-technical audiences
  • Collaborate with researchers to validate findings and improve coverage
  • Help refine internal processes, detection logic, and workflows


What Makes This Role Strong for Practitioners

  • Work with real-world threats, not just alerts
  • Clear connection between your work and customer impact
  • Remote-first environment with flexibility and trust
  • Opportunity to grow into threat research or specialized roles
  • Exposure to a wide range of threats, industries, and attack patterns
  • Fast feedback loop and low bureaucracy
  • Support for learning, certifications, and skill growth


Qualifications

  • Experience in cybersecurity, threat analysis, or SOC environments
  • Understanding of common attack techniques and threat actors
  • Familiarity with vulnerability management and CVE analysis
  • Ability to assess risk and prioritize based on impact
  • Strong analytical and problem-solving skills
  • Clear written communication for technical findings
  • Experience with tools such as SIEM, EDR, or threat intel platforms


Preferred

  • Experience working in a SOC, MSSP, or threat intelligence team
  • Familiarity with frameworks like MITRE ATT&CK
  • Basic scripting skills (Python or similar)
  • Exposure to malware analysis or incident response
  • Relevant certifications (Security+, CySA+, GCIH, etc.) are helpful but not required


Nice to Have (but not required)

  • Experience with cloud environments (AWS, Azure, GCP)
  • Detection engineering or threat hunting experience
  • Experience working with large datasets or log analysis


Compensation & Benefits

  • Competitive salary based on experience
  • Bonus or equity potential
  • Fully remote work with flexible hours
  • Home office stipend
  • Learning and certification budget
  • Conference support
  • Health, dental, and vision coverage

Similar Jobs

Explore other opportunities that match your interests

Senior Azure Security Engineer

Cyber Security
•
1d ago
Visa Sponsorship Relocation Remote
Job Type Full-time
Experience Level Mid-Senior level

Jobs via Dice

United State

Senior Security Engineer

Cyber Security
•
1d ago

Premium Job

Sign up is free! Login or Sign up to view full details.

•••••• •••••• ••••••
Job Type ••••••
Experience Level ••••••

TEKsystems

United State

Senior Security Analyst - SIEM & EDR

Cyber Security
•
1d ago

Premium Job

Sign up is free! Login or Sign up to view full details.

•••••• •••••• ••••••
Job Type ••••••
Experience Level ••••••

maestro search

United State

Subscribe our newsletter

New Things Will Always Update Regularly