Position: Senior Analyst (L2) – Security Operations
Employment Type: Full-Time, Exempt
Location: On-site, Scottsdale, AZ
We are seeking a self-driven and detail-oriented Senior Analyst to join our dynamic team. In this role, you will be responsible for managing customer-facing investigations, mentoring and training junior analysts, and collaborating with both internal teams and customers through various communication channels. You will leverage your expertise in system troubleshooting and security operations to provide top-tier support and guidance.
Key Responsibilities:
- Triage security alerts and determine if further investigation or action is required from the customer.
- Assist customers in incident investigation and response, providing valuable insights throughout the entire process.
- Conduct thorough investigations of customer requests, offering context and recommending actionable solutions.
- Engage in proactive threat hunting using network and host data to identify potential risks within customer environments.
- Mentor junior analysts, helping them grow professionally and develop their skills.
Required Qualifications:
- At least 2 years of hands-on experience in triaging, investigating, and tuning SIEM systems (LogRhythm or similar).
- Expertise in analyzing packet captures, data, and logs to perform incident response and identify network security compromises.
- In-depth knowledge of the TCP/IP protocol suite, security architecture, and common tactics, techniques, and procedures (TTPs) used by threat actors.
- Experience with SIEM platforms (such as RSA NetWitness, Azure Sentinel, Splunk, LogRhythm, etc.).
- Strong understanding of incident response methodologies, as well as effective reporting practices.
- Proficiency in using ticketing systems for tracking and resolution (e.g., JIRA, Remedy, ServiceNow, etc.).
- Ability to respond quickly and decisively in high-pressure situations.
- Willingness and ability to rapidly learn new technologies.
Preferred Qualifications:
- At least 3+ years of experience performing triage and incident response in enterprise environments.
- At least 3+ years of experience in forensic analysis of logs and packet captures to identify malicious activities.
- Relevant security certifications (CEH, GCIH, GCFA, GCFE, GCTI, GCIA, GREM, GPEN, GFNA, OCSP).
- Strong research and analytical skills, particularly in event classification, correlation, and root cause analysis.
- Previous experience mentoring or leading teams, including orchestrating collaborative efforts to solve complex problems.
- Proven ability to manage projects to completion both individually and within a team.