Security Analyst
We’re is a privately owned company headquartered in San Jose, California. We began in 1996 by providing consulting services in the telecommunications industry and have since evolved into a trusted managed services provider for businesses of all sizes. Today, we deliver a broad range of IT services, including managed network engineering and managed cybersecurity operations. We serve as a single-source partner for businesses seeking expert management of their technology infrastructure and security posture.
Our dedicated cybersecurity division provides around-the-clock monitoring, threat detection and response, and expert incident handling for client systems and networks. We operate a distributed Security Operations Center (SOC) staffed by analysts and engineers across multiple regions, using advanced tools and frameworks to protect our clients against today’s evolving threats.
We are seeking a motivated and experienced Security Analyst to join our remote team. In this role, you will monitor security events across both internal and client environments, investigate suspicious activity, and respond to alerts using platforms such as RSA NetWitness, ThreatDown, Check Point, and others. The ideal candidate is analytical, self-directed, and comfortable working independently in a distributed team. This position is well-suited for professionals who enjoy hands-on investigations and protecting systems and data from cyber threats.
Shift Availability
- Shift: Saturday to Wednesday, 4 pm to 12 midnight EST US time (Thursday and Friday off).
Key Responsibilities
- Monitor and analyze security events from various sources, including SIEMs, firewalls, IPS/IDS, endpoint protection platforms, and other security tools.
- Investigate alerts, determine threat severity, and perform root-cause analysis of suspicious activity and confirmed incidents.
- Apply threat intelligence and behavioral indicators to identify malware, exploits, reconnaissance activity, and lateral movement.
- Respond to detections and escalate confirmed incidents or complex cases according to documented procedures and client requirements.
- Monitor system health and performance of security controls and tools; investigate anomalies and notify appropriate teams when issues are identified.
- Perform change activities such as updating IPS signatures, tuning detection rules, or implementing client-approved security configuration changes.
- Collaborate with senior analysts and engineers to improve detection coverage and tuning.
- Respond to client inquiries related to security events, investigations, and security policies or procedures.
- Provide general guidance to clients and end-users on security-related inquiries as needed.
- Participate in regular team workflows including ticketing systems, shift handoffs, and collaboration with analysts and engineers.
- Create investigation summaries, reports, and operational documentation as needed.
- Maintain up-to-date knowledge of security threats, tools, and investigation techniques.
- Perform other cybersecurity-related duties as assigned.
Minimum Qualifications
- 2+ years of hands-on experience in a Security Analyst, SOC Analyst, or equivalent role.
- Proficiency using SIEM platforms and security monitoring tools (e.g., RSA NetWitness).
- Strong understanding of TCP/IP, networking protocols, and common attack techniques.
- Familiarity with malware behavior, phishing campaigns, exploit tactics, and intrusion methodologies.
- Strong working knowledge of Windows and Linux operating systems.
- Fluent English communication skills (both spoken and written).
- Demonstrated ability to work independently and stay engaged while working remotely.
- Must pass a background check and online technical assessment.
Preferred Qualifications
Self-motivated with strong critical thinking, troubleshooting, and documentation skills.
Bachelor’s degree in Computer Science, Information Security, or a related field.
Certifications such as Security+, CEH, CND, CISSP Associate, or equivalent.
Experience with endpoint protection platforms, IPS/IDS systems, and firewalls.
Exposure to incident response processes, including containment and remediation.
Ability to write clear and concise reports and communicate effectively with clients and team members.