Cyber Security Analyst (SOC / Threat Hunting & Malware Analysis)

Jobs via Dice • United State
Relocation
Apply
AI Summary

Join a global SOC team to handle advanced threat detection, incident response, and malware analysis. Investigate and respond to security incidents, perform triage, root cause analysis, containment, and remediation. Conduct malware analysis and extract IOCs.

Key Highlights
Handle advanced threat detection, incident response, and malware analysis
Investigate and respond to security incidents
Conduct malware analysis and extract IOCs
Key Responsibilities
Investigate and respond to security incidents
Perform triage, root cause analysis, containment, and remediation
Conduct malware analysis and extract IOCs
Perform proactive threat hunting and analyze logs for suspicious activity
Improve detection rules (SIEM, IDS/IPS) and reduce false positives
Conduct network/host forensics and advanced malware analysis
Mentor junior analysts and collaborate with global teams
Technical Skills Required
SIEM IDS/IPS log analysis REGEX C/C++ Python/Perl x86 reverse engineering static/dynamic analysis TCP/IP protocols DDoS

Job Description


Dice is the leading career destination for tech experts at every stage of their careers. Our client, Stellent IT LLC, is seeking the following. Apply via Dice today!

Job Title: Cyber Security Analyst (SOC / Threat Hunting & Malware Analysis)

Location: Jersey City, New Jersey (Fully onsite Candidate must be open to relocation if non-local)

Job Type : W2 Contract

MOI: Telephonic, video, and final in-person.

Role Overview

Join a global SOC team to handle advanced threat detection, incident response, and malware analysis. You'll also mentor junior analysts and help improve security operations.

Key Responsibilities

  • Investigate and respond to security incidents (malware, phishing, DDoS, unauthorized access)
  • Perform triage, root cause analysis, containment, and remediation
  • Conduct malware analysis and extract IOCs
  • Perform proactive threat hunting and analyze logs for suspicious activity
  • Improve detection rules (SIEM, IDS/IPS) and reduce false positives
  • Conduct network/host forensics and advanced malware analysis
  • Mentor junior analysts and collaborate with global teams

Required Skills

  • Strong experience in Incident Response, Threat Hunting, Malware Analysis
  • Hands-on with SIEM, IDS/IPS, log analysis
  • Proficiency in REGEX (mandatory)
  • Programming: C/C++ + Python/Perl
  • Knowledge of x86, reverse engineering, static/dynamic analysis
  • Strong networking knowledge (TCP/IP, protocols, DDoS)

Qualifications

  • Master's + 3 yrs, OR Bachelor's + 5 yrs, OR 9+ yrs relevant experience

Certifications

  • Required: OSCP/OSCE (Anyone at least)
  • Preferred: GNFA, GCFE, GPEN, GREM

Key Traits

  • Strong analytical and problem-solving skills
  • Ability to detect advanced threats
  • Good communication and teamwork
  • Experience mentoring others

Email- Phone Number : +1 321 7856 062

STELLENT IT A Nationally Recognized Minority Certified Enterprise

"Happiness can be found, even in the darkest of times, if one only remembers to turn on the light."

  • JK Rowling

Similar Jobs

Explore other opportunities that match your interests

Manager Industrial Security 2

Cyber Security
•
5h ago

Premium Job

Sign up is free! Login or Sign up to view full details.

•••••• •••••• ••••••
Job Type ••••••
Experience Level ••••••

Northrop Grumman

United State

Senior Cyber Security Engineer

Cyber Security
•
6h ago
Visa Sponsorship Relocation Remote
Job Type Full-time
Experience Level Mid-Senior level

parry labs

United State

Forward Deployed Security Engineer

Cyber Security
•
6h ago
Visa Sponsorship Relocation Remote
Job Type Full-time
Experience Level Mid-Senior level

depthfirst

United State

Subscribe our newsletter

New Things Will Always Update Regularly