Threat Analyst

Posted 7 Days Ago
Be an Early Applicant
Orlando, FL
Mid level
Cybersecurity
The Role
The Threat Analyst is responsible for identifying and responding to cyber threats, monitoring for suspicious activity, conducting forensic analyses, and developing security tools. This role requires collaboration across teams to ensure effective incident response and ongoing improvements to security measures.
Summary Generated by Built In

COMPANY OVERVIEW

ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools for the Managed Services Provider (MSP) industry to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities.


Job Summary:

The Security Detection & Response Engineer is responsible for identifying, investigating, and responding to cyber threats, vulnerabilities, and security incidents across the organization’s systems and networks. This role focuses on proactive monitoring and quick response to security events to protect the organization's data and critical infrastructure. The ideal candidate has strong technical skills in threat detection, security monitoring, and incident response.


Key Responsibilities:

Threat Detection and Monitoring:

  • Monitor security tools and systems (SIEM, IDS/IPS, EDR, etc.) for suspicious activity or breaches.
  • Analyze security alerts and data to identify potential threats, vulnerabilities, and compromises.
  • Build and refine detection capabilities using security tools, threat intelligence, and machine learning models.

Incident Response:

  • Lead and participate in the response to security incidents (investigating, containing, eradicating, and recovering from threats).
  • Collaborate with cross-functional teams to develop incident handling processes and ensure timely remediation.
  • Create detailed post-incident reports, including root cause analysis and recommendations for improvements.

Security Tool Development & Automation:

  • Develop automated tools and scripts to enhance security detection capabilities and streamline threat detection workflows.
  • Maintain and enhance detection tools, including writing custom SNORT, SIGMA, and YARA rules, and updating rulesets in accordance with new threats.

Security Investigations:

  • Conduct forensic analysis and threat hunting to identify malicious activity.
  • Review logs from various systems (e.g., firewalls, servers, network devices) to uncover unauthorized activities.
  • Research and stay current on emerging threats, vulnerabilities, and cyber-attack techniques.

Continuous Improvement:

  • Contribute to the enhancement of security monitoring tools, processes, and playbooks.
  • Develop automated scripts and tools to improve detection and response efficiency.
  • Work closely with DevOps, Network, and Security Engineering teams to ensure secure architectures and systems.

Threat Intelligence:

  • Leverage internal and external threat intelligence sources to stay informed about the latest security trends and threats.
  • Share insights with internal stakeholders to ensure proactive measures are in place.

Compliance & Reporting:

  • Ensure security processes and procedures align with regulatory requirements and industry best practices (e.g., NIST, CIS, ISO 27001).
  • Assist in the preparation of audit reports and security assessments.

Key Skills & Qualifications:

Education:

  • Bachelor’s degree in information security, Cybersecurity, Computer Science, or a related field (or equivalent experience).

Experience:

  • 3+ years of experience in a security-focused role, preferably in detection, monitoring, or incident response.

Technical Skills:

  • Strong familiarity with SIEM tools, EDR tools, and IDS/IPS systems.
  • Knowledge of network security technologies and protocols (TCP/IP, DNS, VPNs, firewalls, etc.).
  • Proficiency in scripting languages such as Python, PowerShell, or Bash.
  • Proficiency in custom SNORT, SIGMA, and YARA rule creation.
  • Understanding of malware behavior, attack vectors, and vulnerability exploitation techniques.

Certifications (Preferred):

  • GIAC Certified Intrusion Analyst (GCIA)
  • GIAC Security Essentials Certification (GSEC)
  • Certified Information Systems Security Professional (CISSP)
  • Certified Ethical Hacker (CEH)
  • OffSec Certified Professional (OSCP)
  • CompTIA Certs
  • Security +
  • Network +
  • Pentest +
  • CASP+

Soft Skills:

  • Excellent analytical and problem-solving abilities.
  • Ability to work under pressure and manage multiple detection initiatives simultaneously.
  • Strong written and verbal communication skills, with an ability to present technical concepts clearly.
  • Detail-oriented with the ability to quickly assess security issues and provide appropriate remediation actions.


WORKING CONDITIONS

The duties described below are representative of those encountered while performing the essential functions of this position. If necessary, reasonable accommodation may be requested and will be evaluated for its relationship to the essential functions that must be performed.

  • Job will generally be performed in an office environment but may require travel to visit company offices and/or property locations.
  • While performing duties of this job, would occasionally require to stand, walk, sit, reach with hands and arms, climb or balance, stoop or kneel, talk and hear, and use fingers and hands to feel objects and tools.
  • Must occasionally lift and/or move up to 25 pounds.
  • Specific vision abilities required include close vision, distance vision, depth perceptions, and the ability to adjust focus.

Top Skills

C++
Java
Python
The Company
HQ: Maitland, FL
179 Employees
On-site Workplace
Year Founded: 2017

What We Do

ThreatLocker is leading the cybersecurity market towards a more secure approach to blocking unknown application vulnerabilities. The ThreatLocker Control Suite combines Application Whitelisting, Ringfencing™, Storage Control, and Elevation Control solutions in ways that make security simple.

ThreatLocker’s powerful suite of security tools is designed so that everyone from businesses to government agencies to academic institutions can directly control exactly what applications run on their networks.

Since its founding in 2017, ThreatLocker has been recognized as one of the most efficient cyber security software. Headquartered in Maitland, Florida.

Similar Jobs

Jacksonville, FL, USA
200 Employees

Core One Logo Core One

Futures Threat Analyst

Security • Cybersecurity
Tampa, FL, USA
61 Employees

Liberty Mutual Insurance Logo Liberty Mutual Insurance

Senior Technical Support Agent

Artificial Intelligence • Fintech • Insurance • Marketing Tech • Software • Analytics
Hybrid
Miami, FL, USA
45000 Employees
59K-92K Annually

KPA Logo KPA

Environmental Health & Safety Consultant

Automotive • Greentech • HR Tech • Sales • Software
Easy Apply
Hybrid
St. Cloud, FL, USA
405 Employees

Similar Companies Hiring

Invoice Home Thumbnail
Software • SEO • Mobile • Information Technology • Fintech • Financial Services • Cybersecurity
Austin, TX
20 Employees
MacPaw Thumbnail
Software • Security • Information Technology • Data Privacy • Cybersecurity • App development
Cambridge, MA
550 Employees
Silverfort Thumbnail
Security • Sales • Information Technology • Cybersecurity • Automation
GB
357 Employees

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account