Overview
The Mid-Level Cyber Analyst plays a key role in securing enterprise systems through proactive monitoring, advanced threat analysis, and incident response. The role involves collaboration with IT, engineering, and compliance teams to improve the organization’s overall security posture.
Key Responsibilities
- Lead analysis of complex security incidents and drive incident response efforts.
- Develop detection rules, tuning SIEM use cases, and creating actionable alerts.
- Conduct vulnerability assessments and partner with infrastructure teams for remediation.
- Support endpoint detection and response (EDR) and network intrusion detection (NIDS / NIPS) tuning.
- Perform threat hunting and forensic analysis to identify indicators of compromise (IoCs).
- Assist in designing and implementing security controls for new technologies or projects.
- Mentor junior analysts and support continuous process improvement in SOC operations.
Qualifications
Bachelor’s degree in Cybersecurity, Computer Science, or related discipline.3–5 years of experience in security operations, incident response, or network defense.Expertise with SIEM tools (e.g., Splunk, Sentinel, QRadar), EDR, and vulnerability management platforms.Knowledge of MITRE ATT&CK framework and common attack vectors.Certifications such as CompTIA CySA+, CEH, GCIH, or CISSP (in progress) preferred.Strong analytical, scripting (Python, PowerShell), and communication skills.