Threat Investigation & Mitigation (20% of the time).
Proactive Threat Hunting (20% of the time).
Dataset Analysis/Anomalies (15% of the time).
Hunting Methodologies (10% of the time).
Collaboration/IR (10% of the time). Documentation/Reporting (10% of the time).
Process Improvement (10% of the time).
Evolving Threat Landscape (5% of the time).
*May telecommute
Requirements:
Master's in Cybersecurity, Information Technology, Computer Science, or closely related + 2 y. exp. as an Information Security Analyst using Splunk, Elastic Search, Azure Sentinel, Palo Alto XSOAR, Tanium, SentinelOne, Qualys, Trellix, Cisco Firepower, Wireshark, AWS (CloudWatch, CloudTrail, & Security Hub).
-OR-
Bachelor's in Cybersecurity, Information Technology, Computer Science, or closely related + 5 y. exp. as an Information Security Analyst using Splunk, Elastic Search, Azure Sentinel, Palo Alto XSOAR, Tanium, SentinelOne, Qualys, Trellix, Cisco Firepower, Wireshark, AWS (CloudWatch, CloudTrail, & Security Hub).