Threat Analyst

Full-time
USA - West, Canada
Posted 1 year ago
Go ad-free with Premium ×
The job listing has expired. Unfortunately, the hiring company is no longer accepting new applications.

To see similar active jobs please follow this link: Remote Consulting jobs

About the role

We are looking for a Threat Analyst to support and expand Coalition’s Managed Detection and Response (MDR) security program. This role focuses on threat detection, analysis, and response within platforms like Microsoft Defender, SentinelOne, and CrowdStrike Falcon.

As part of the MDR team, you will play a crucial role in protecting our policyholders/enhancing Coalition’s cybersecurity capabilities. You will work closely with a collaborative team of analysts, engineers, and security professionals to deliver cutting-edge detection and response solutions. This role provides opportunities for growth, exposure to advanced threat analysis techniques, and hands-on experience with leading security tools.

The Threat Analyst role reports to the MDR Team Lead and partners with the IT and Security Engineering teams.

This position is remote and based in the western United States/Canada.

Responsibilities

  • Monitor and analyze security alerts from EDR platforms (Microsoft Defender, SentinelOne, CrowdStrike Falcon).

  • Investigate and respond to incidents, including identifying Indicators of Compromise (IOCs) and Indicators of Attack (IOAs).

  • Perform initial forensic analysis on logs, endpoints, and network data to assess potential threats.

  • Collaborate with senior analysts on the investigation and resolution of advanced threats.

  • Develop clear and concise incident reports for technical teams and business stakeholders.

  • Assist in maintaining and fine-tuning detection rules and security monitoring configurations.

  • Stay updated on emerging threats, vulnerabilities, and attack techniques.

  • Contribute to team documentation, playbooks, and processes to enhance operational efficiency.

Skills and Qualifications

  • 2-4 years of experience in a cybersecurity operations or threat analysis role.

  • Hands-on experience with EDR platforms such as Microsoft Defender, SentinelOne, or CrowdStrike Falcon.

  • Familiarity with SIEM platforms (e.g., Microsoft Sentinel, Splunk) for log analysis and threat detection.

  • Basic understanding of incident response processes, including containment, eradication, and recovery.

  • Knowledge of malware analysis, network protocols, and system log analysis.

  • Strong analytical skills with attention to detail in identifying patterns and anomalies.

  • Ability to communicate effectively with technical and non-technical audiences.

Preferred Certifications

  • CompTIA Security+

  • GIAC Certified Incident Handler (GCIH)

  • Certified Ethical Hacker (CEH)

  • Microsoft Certified: Security, Compliance, and Identity Fundamentals

Bonus Skills

  • Experience working in Managed Detection and Response (MDR) environments.

  • Familiarity with scripting languages like Python or PowerShell to enhance investigative capabilities.

  • Exposure to network traffic and protocol analysis tools like Wireshark.

  • Strong organizational skills and the ability to manage multiple investigations simultaneously.

Perks

  • 100% medical, dental, and vision coverage

  • Flexible PTO

  • Annual home office stipend and WeWork access

  • Mental & physical health wellness programs like Headspace, Lumino, and more!

  • Competitive compensation and opportunity for advancement

Go ad-free with Premium ×
About the Job
Full-time
USA - West, Canada
Posted 1 year ago
Check if your resume is a good fit
25/100
Get Full Report
+ 1,284 new jobs added today
30,000+
Remote Jobs

Don't miss out — new listings every hour

Join Premium

Threat Analyst

The job listing has expired. Unfortunately, the hiring company is no longer accepting new applications.

To see similar active jobs please follow this link: Remote Consulting jobs

About the role

We are looking for a Threat Analyst to support and expand Coalition’s Managed Detection and Response (MDR) security program. This role focuses on threat detection, analysis, and response within platforms like Microsoft Defender, SentinelOne, and CrowdStrike Falcon.

As part of the MDR team, you will play a crucial role in protecting our policyholders/enhancing Coalition’s cybersecurity capabilities. You will work closely with a collaborative team of analysts, engineers, and security professionals to deliver cutting-edge detection and response solutions. This role provides opportunities for growth, exposure to advanced threat analysis techniques, and hands-on experience with leading security tools.

The Threat Analyst role reports to the MDR Team Lead and partners with the IT and Security Engineering teams.

This position is remote and based in the western United States/Canada.

Responsibilities

  • Monitor and analyze security alerts from EDR platforms (Microsoft Defender, SentinelOne, CrowdStrike Falcon).

  • Investigate and respond to incidents, including identifying Indicators of Compromise (IOCs) and Indicators of Attack (IOAs).

  • Perform initial forensic analysis on logs, endpoints, and network data to assess potential threats.

  • Collaborate with senior analysts on the investigation and resolution of advanced threats.

  • Develop clear and concise incident reports for technical teams and business stakeholders.

  • Assist in maintaining and fine-tuning detection rules and security monitoring configurations.

  • Stay updated on emerging threats, vulnerabilities, and attack techniques.

  • Contribute to team documentation, playbooks, and processes to enhance operational efficiency.

Skills and Qualifications

  • 2-4 years of experience in a cybersecurity operations or threat analysis role.

  • Hands-on experience with EDR platforms such as Microsoft Defender, SentinelOne, or CrowdStrike Falcon.

  • Familiarity with SIEM platforms (e.g., Microsoft Sentinel, Splunk) for log analysis and threat detection.

  • Basic understanding of incident response processes, including containment, eradication, and recovery.

  • Knowledge of malware analysis, network protocols, and system log analysis.

  • Strong analytical skills with attention to detail in identifying patterns and anomalies.

  • Ability to communicate effectively with technical and non-technical audiences.

Preferred Certifications

  • CompTIA Security+

  • GIAC Certified Incident Handler (GCIH)

  • Certified Ethical Hacker (CEH)

  • Microsoft Certified: Security, Compliance, and Identity Fundamentals

Bonus Skills

  • Experience working in Managed Detection and Response (MDR) environments.

  • Familiarity with scripting languages like Python or PowerShell to enhance investigative capabilities.

  • Exposure to network traffic and protocol analysis tools like Wireshark.

  • Strong organizational skills and the ability to manage multiple investigations simultaneously.

Perks

  • 100% medical, dental, and vision coverage

  • Flexible PTO

  • Annual home office stipend and WeWork access

  • Mental & physical health wellness programs like Headspace, Lumino, and more!

  • Competitive compensation and opportunity for advancement