MENU
  • Remote Jobs
  • Companies
  • Go Premium
  • Job Alerts
  • Post a Job
  • Log in
  • Sign up
Working Nomads logo Working Nomads
  • Remote Jobs
  • Companies
  • Post Jobs
  • Go Premium
  • Get Free Job Alerts
  • Log in

Threat Analyst

Optiv

Full-time
USA
analyst
infosec
security
communication
automation
Apply for this position

This position will be fully remote and can be hired anywhere in the continental U.S. 

  

This team provides 24/7 support.  This role will be Monday-Friday 11:00pm-8:00am Eastern.

U.S. Citizenship required. Due to client requirements we cannot accept dual citizenship for this particular role.

  

The Threat Analyst will provide intrusion/incident monitoring and detection utilizing customer provided data sources, audit, and monitoring tools at both the government and enterprise level. The Threat Analyst will work closely with our Technology Analysts and Architects to service customers.  

  

How you’ll make an impact 

 

  • High level professional writing experience regarding documenting and reporting on potential security incidents identified in customer environments and timeline of events. 

  • Work with partners to maintain an understanding of security threats, vulnerabilities, and exploits that could impact systems, networks, and assets.  

  • Act as a coordinator for security events that require urgent response, containment, and remediation.  

  • Provide analysis on various security enforcement technologies including, but not limited to SIEM, anti-virus, content filtering/reporting, malware prevention, firewalls, intrusion detection systems, web application firewalls, messaging security platforms, vulnerability scanners etc.  

  • Perform knowledge transfers, document, and train clients regarding mitigation of identified threats.  

  • Provide ongoing recommendations to other peers and customers on tuning and best practices. 

  • Actively research current threats and attack vectors being exploited in the wild  

  • Actively work with other analysts and perform investigations on escalations.  

  

What we’re hiring for  

  • U.S. Citizenship required. Due to client requirements we cannot accept dual citizenship for this particular role.

  • Three or more years of full-time professional experience in the Information Security field  

  • Experience working in a Security Operations Center (SOC), Managed Security Service (MSS), or enterprise network environment as a point of escalation. 

  • Excellent time management, reporting, and communication skills including customer interactions and executive presentations. 

  • Data analysis using SIEM, Database tools, and Excel.  

  • Experience troubleshooting security devices and SIEM.  

  • Ability to create and maintain content within SIEM environments and make recommendations to clients to better their visibility. 

  • IDS monitoring/analysis with tools such as Sourcefire and Snort  

  • Experience with SIEM platforms preferred (QRadar, LogRhythm, McAfee/Nitro, ArcSight, Splunk) a plus. 

  • Direct (E.g., SQL Injection) versus indirect (E.g., cross-site scripting) attacks  

  • Experience with the following attacks: Web Based Attacks and the OWASP Top 10, Network Based DoS, Brute force, HTTP Based DoS, Denial of Service, Network Based / System Based Attacks. 

  • Familiarity with SANS top 20 critical security controls  

  • Understand the foundations of enterprise Windows security including Active Directory, Windows security architecture and terminology, Privilege escalation techniques, Common mitigation controls and system hardening. 

  • Anti-Virus (AV) and Host Based Intrusion Prevention (HIPS)  

  • Experience in monitoring at least one commercial AV solution such as (but not limited to) McAfee/Intel, Symantec, Sophos, or Trend Micro  

  • Ability to identify common false positives and make suggestions on tuning.  

  • Understanding of root causes of malware and proactive mitigation  

  • Propagation of malware in enterprise environments  

  • Familiarity with web-based exploit kits and the methods employed by web-based exploit kits.  

  • Familiarity with concepts associated with Advanced Persistent Threats and “targeted malware.”  

  • Experience and understanding of malware protection tools (FireEye) and controls in an enterprise environment.  

  • Covert channels, egress, and data exfiltration techniques  

  • Familiarity with vulnerability scoring systems such as CVSS.  

  • Basic understanding of vulnerability assessment tools such as vulnerability scanners and exploitation frameworks  

      

#LI-TW1

#LI-Remote

What you can expect from Optiv

  • A company committed to championing Diversity, Equality, and Inclusion through our Employee Resource Groups.

  • Work/life balance

  • Professional training resources

  • Creative problem-solving and the ability to tackle unique, complex projects

  • Volunteer Opportunities. “Optiv Chips In” encourages employees to volunteer and engage with their teams and communities.

  • The ability and technology necessary to productively work remotely/from home (where applicable)

EEO Statement

Optiv is an equal opportunity employer. All qualified applicants for employment will be considered without regard to race, color, religion, sex, gender identity or expression, sexual orientation, pregnancy, age 40 and over, marital status, genetic information, national origin, status as an individual with a disability, military or veteran status, or any other basis protected by federal, state, or local law.

Optiv respects your privacy. By providing your information through this page or applying for a job at Optiv, you acknowledge that Optiv will collect, use, and process your information, which may include personal information and sensitive personal information, in connection with Optiv’s selection and recruitment activities.  For additional details on how Optiv uses and protects your personal information in the application process, click here to view our Applicant Privacy Notice. If you sign up to receive notifications of job postings, you may unsubscribe at any time.

Apply for this position
Bookmark Report

About the job

Full-time
USA
3 Applicants
Posted 23 hours ago
analyst
infosec
security
communication
automation

Apply for this position

Bookmark
Report
Enhancv advertisement

30,000+
REMOTE JOBS

Unlock access to our database and
kickstart your remote career
Join Premium

Threat Analyst

Optiv

This position will be fully remote and can be hired anywhere in the continental U.S. 

  

This team provides 24/7 support.  This role will be Monday-Friday 11:00pm-8:00am Eastern.

U.S. Citizenship required. Due to client requirements we cannot accept dual citizenship for this particular role.

  

The Threat Analyst will provide intrusion/incident monitoring and detection utilizing customer provided data sources, audit, and monitoring tools at both the government and enterprise level. The Threat Analyst will work closely with our Technology Analysts and Architects to service customers.  

  

How you’ll make an impact 

 

  • High level professional writing experience regarding documenting and reporting on potential security incidents identified in customer environments and timeline of events. 

  • Work with partners to maintain an understanding of security threats, vulnerabilities, and exploits that could impact systems, networks, and assets.  

  • Act as a coordinator for security events that require urgent response, containment, and remediation.  

  • Provide analysis on various security enforcement technologies including, but not limited to SIEM, anti-virus, content filtering/reporting, malware prevention, firewalls, intrusion detection systems, web application firewalls, messaging security platforms, vulnerability scanners etc.  

  • Perform knowledge transfers, document, and train clients regarding mitigation of identified threats.  

  • Provide ongoing recommendations to other peers and customers on tuning and best practices. 

  • Actively research current threats and attack vectors being exploited in the wild  

  • Actively work with other analysts and perform investigations on escalations.  

  

What we’re hiring for  

  • U.S. Citizenship required. Due to client requirements we cannot accept dual citizenship for this particular role.

  • Three or more years of full-time professional experience in the Information Security field  

  • Experience working in a Security Operations Center (SOC), Managed Security Service (MSS), or enterprise network environment as a point of escalation. 

  • Excellent time management, reporting, and communication skills including customer interactions and executive presentations. 

  • Data analysis using SIEM, Database tools, and Excel.  

  • Experience troubleshooting security devices and SIEM.  

  • Ability to create and maintain content within SIEM environments and make recommendations to clients to better their visibility. 

  • IDS monitoring/analysis with tools such as Sourcefire and Snort  

  • Experience with SIEM platforms preferred (QRadar, LogRhythm, McAfee/Nitro, ArcSight, Splunk) a plus. 

  • Direct (E.g., SQL Injection) versus indirect (E.g., cross-site scripting) attacks  

  • Experience with the following attacks: Web Based Attacks and the OWASP Top 10, Network Based DoS, Brute force, HTTP Based DoS, Denial of Service, Network Based / System Based Attacks. 

  • Familiarity with SANS top 20 critical security controls  

  • Understand the foundations of enterprise Windows security including Active Directory, Windows security architecture and terminology, Privilege escalation techniques, Common mitigation controls and system hardening. 

  • Anti-Virus (AV) and Host Based Intrusion Prevention (HIPS)  

  • Experience in monitoring at least one commercial AV solution such as (but not limited to) McAfee/Intel, Symantec, Sophos, or Trend Micro  

  • Ability to identify common false positives and make suggestions on tuning.  

  • Understanding of root causes of malware and proactive mitigation  

  • Propagation of malware in enterprise environments  

  • Familiarity with web-based exploit kits and the methods employed by web-based exploit kits.  

  • Familiarity with concepts associated with Advanced Persistent Threats and “targeted malware.”  

  • Experience and understanding of malware protection tools (FireEye) and controls in an enterprise environment.  

  • Covert channels, egress, and data exfiltration techniques  

  • Familiarity with vulnerability scoring systems such as CVSS.  

  • Basic understanding of vulnerability assessment tools such as vulnerability scanners and exploitation frameworks  

      

#LI-TW1

#LI-Remote

What you can expect from Optiv

  • A company committed to championing Diversity, Equality, and Inclusion through our Employee Resource Groups.

  • Work/life balance

  • Professional training resources

  • Creative problem-solving and the ability to tackle unique, complex projects

  • Volunteer Opportunities. “Optiv Chips In” encourages employees to volunteer and engage with their teams and communities.

  • The ability and technology necessary to productively work remotely/from home (where applicable)

EEO Statement

Optiv is an equal opportunity employer. All qualified applicants for employment will be considered without regard to race, color, religion, sex, gender identity or expression, sexual orientation, pregnancy, age 40 and over, marital status, genetic information, national origin, status as an individual with a disability, military or veteran status, or any other basis protected by federal, state, or local law.

Optiv respects your privacy. By providing your information through this page or applying for a job at Optiv, you acknowledge that Optiv will collect, use, and process your information, which may include personal information and sensitive personal information, in connection with Optiv’s selection and recruitment activities.  For additional details on how Optiv uses and protects your personal information in the application process, click here to view our Applicant Privacy Notice. If you sign up to receive notifications of job postings, you may unsubscribe at any time.

Working Nomads

Post Jobs
Premium Subscription
Sponsorship
Free Job Alerts

Job Skills
API
FAQ
Privacy policy
Terms and conditions
Contact us
About us

Jobs by Category

Remote Administration jobs
Remote Consulting jobs
Remote Customer Success jobs
Remote Development jobs
Remote Design jobs
Remote Education jobs
Remote Finance jobs
Remote Legal jobs
Remote Healthcare jobs
Remote Human Resources jobs
Remote Management jobs
Remote Marketing jobs
Remote Sales jobs
Remote System Administration jobs
Remote Writing jobs

Jobs by Position Type

Remote Full-time jobs
Remote Part-time jobs
Remote Contract jobs

Jobs by Region

Remote jobs Anywhere
Remote jobs North America
Remote jobs Latin America
Remote jobs Europe
Remote jobs Middle East
Remote jobs Africa
Remote jobs APAC

Jobs by Skill

Remote Accounting jobs
Remote Assistant jobs
Remote Copywriting jobs
Remote Cyber Security jobs
Remote Data Analyst jobs
Remote Data Entry jobs
Remote English jobs
Remote Spanish jobs
Remote Project Management jobs
Remote QA jobs
Remote SEO jobs

Jobs by Country

Remote jobs Australia
Remote jobs Argentina
Remote jobs Brazil
Remote jobs Canada
Remote jobs Colombia
Remote jobs France
Remote jobs Germany
Remote jobs Ireland
Remote jobs India
Remote jobs Japan
Remote jobs Mexico
Remote jobs Netherlands
Remote jobs New Zealand
Remote jobs Philippines
Remote jobs Poland
Remote jobs Portugal
Remote jobs Singapore
Remote jobs Spain
Remote jobs UK
Remote jobs USA


Working Nomads curates remote digital jobs from around the web.

© 2025 Working Nomads.