Cybersecurity Analyst (Veteran Focus)

Jobs via Dice United State
Remote
Apply
AI Summary

We're seeking a Cybersecurity Analyst to fortify digital defenses. The role involves monitoring and responding to threats, driving cloud security, and conducting threat intelligence. The ideal candidate has 4-7 years of experience in threat intelligence, SOC operations, and cloud security.

Key Highlights
Monitor and respond to threats using SIEM/XDR tools
Drive cloud security by monitoring AWS telemetry
Conduct threat intelligence and engineer detections
Key Responsibilities
Monitor and respond to threats using SIEM/XDR tools
Apply EDR solutions for proactive endpoint security
Drive cloud security by monitoring AWS telemetry
Technical Skills Required
SIEM/XDR (Splunk, Microsoft Sentinel, Google Chronicle) EDR (CrowdStrike, Microsoft Defender, AWS GuardDuty) AWS cloud security
Benefits & Perks
Remote work
Salary range: $85k - $140k per year

Job Description


Dice is the leading career destination for tech experts at every stage of their careers. Our client, BMR Infotek, is seeking the following. Apply via Dice today!

Cybersecurity Analyst (Veteran Focus) – Remote

We’re on a mission to fortify digital defenses, and we proudly invite U.S. veterans to join us. We are seeking Cybersecurity Analysts with 4-7 years or 7-9 years of hands-on experience in threat intelligence, SOC operations, and cloud security. This is a fully remote role, allowing you to apply your skills from anywhere.

What You’ll Do:

  • Monitor and respond to threats using SIEM/XDR tools such as Splunk, Microsoft Sentinel, and Google Chronicle.
  • Apply EDR solutions like CrowdStrike Falcon, Microsoft Defender, and AWS GuardDuty for proactive endpoint security.
  • Drive cloud security by monitoring AWS telemetry and ensuring secure cloud infrastructures.
  • Conduct threat intelligence (IOC development, TTP analysis, adversary tracking, and MITRE ATT&CK mapping).
  • Engineer detections: alert tuning, correlation refinement, behavioral detections, and use-case development.
  • Lead incident response: triage, containment, eradication, root cause analysis, and executive reporting.
  • Conduct threat hunting: hypothesis-driven hunts, anomaly detection, and campaign tracking.
  • Ensure compliance with standards like PCI-DSS, HIPAA, SOC controls, and CVSS prioritization.
  • Leverage infrastructure knowledge (Windows Server, Active Directory, networking) to secure hybrid environments.

What We’re Looking For:

  • Veterans with a passion for cybersecurity.
  • 4-7 years of hands-on experience: threat intelligence, SOC operations, cloud security (AWS), and detection engineering.
  • Or, 7-9 years of experience: advanced threat analysis, leadership in SOC, and cloud security.
  • Technical skills in SIEM/XDR (Splunk, Sentinel, Chronicle), EDR (CrowdStrike, Defender, GuardDuty), and AWS cloud security.
  • Certifications such as CISSP, CEH, GCIA, and CompTIA A+, Security+ are all welcomed.

Compensation:

  • 4-7 years: $85k - $100k per year.
  • 7-9 years: $100k - $140k per year.

Join us in safeguarding the nation’s digital future. Apply today!

Similar Jobs

Explore other opportunities that match your interests

Cybersecurity & Identity Protection Engineer

Cyber Security
12h ago

Premium Job

Sign up is free! Login or Sign up to view full details.

•••••• •••••• ••••••
Job Type ••••••
Experience Level ••••••

BLACKCLOAK

United State

Cybersecurity Architect

Cyber Security
12h ago
Visa Sponsorship Relocation Remote
Job Type Full-time
Experience Level Mid-Senior level

D&H Distributing

United State
Visa Sponsorship Relocation Remote
Job Type Contract
Experience Level Mid-Senior level

Radiant Digital

United State

Subscribe our newsletter

New Things Will Always Update Regularly