NEWPosted 4 hours ago

Job ID: JOB_ID_5303

Job Description: Security Analyst

We are seeking a skilled and experienced Security Analyst to join our Security Operations Center (SOC). The ideal candidate will be responsible for leading and coordinating incident response activities, developing and maintaining incident response playbooks, and performing threat hunting to identify and mitigate security threats. This role requires a strong understanding of cybersecurity principles, hands-on experience with various security tools, and the ability to work effectively in a 24×7 operational environment.

Key Responsibilities:

  • Lead and coordinate incident response activities, ensuring timely and effective resolution of security incidents.
  • Develop, implement, and maintain incident response playbooks, procedures, and documentation.
  • Conduct proactive threat hunting using SIEM, EDR, and threat intelligence platforms to identify potential security breaches.
  • Perform digital forensics and malware analysis to determine the scope, impact, and root cause of security incidents.
  • Collaborate with cross-functional teams, including IT, legal, and business units, to contain, eradicate, and remediate threats.
  • Stay current with emerging threats, vulnerabilities, attack vectors, and security trends to enhance our security posture.
  • Mentor and guide junior SOC analysts, fostering a culture of continuous learning and improvement.
  • Monitor security alerts and events, analyze logs, and investigate suspicious activities.
  • Contribute to the continuous improvement of SOC processes, tools, and technologies.

Required Qualifications:

  • Experience: 8+ years of progressive experience in cybersecurity, with a significant focus on Security Operations Center (SOC) operations and incident response.
  • Environment: Proven experience working in a 24×7 operational environment, with a preference for experience across multiple geographies.
  • Technical Skills:
    • Solid understanding of networking protocols (TCP/IP, DNS, HTTP/S), operating systems (Windows, Linux), and core security technologies (firewalls, IDS/IPS, VPNs).
    • Hands-on experience with malware analysis techniques and digital forensics investigations.
    • Familiarity with cybersecurity frameworks and best practices, such as NIST Cybersecurity Framework, MITRE ATT&CK, and ISO 27001.
    • Proficiency with security tools including:
      • SIEM: Splunk, CrowdStrike, QRadar
      • EDR: CrowdStrike, Carbon Black, SentinelOne
      • SOAR: Palo Alto XSOAR, Splunk SOAR
      • Forensics: FTK Imager, Autopsy, Wireshark, Procmon

Preferred Certifications:

  • GIAC Certified Incident Handler (GCIH)
  • GIAC Certified Forensic Analyst (GCFA)
  • Certified Ethical Hacker (CEH)

This role is based in St. Petersburg, FL, and requires an onsite presence. The contract duration is for an unspecified period, with potential for extension.


Special Requirements

Onsite in St. Petersburg, FL. Contract role. No specific visa constraints mentioned. No explicit screening steps or interview modes detailed beyond standard hiring process. Domain: Cybersecurity Operations.


Compensation & Location

Salary: $70,000 – $100,000 per year

Location: St. Petersburg, FL


Recruiter / Company – Contact Information

Email: ikavinayagam.p@smartitframe.com


Interested in this position?
Apply via Email

Recruiter Notice:
To remove this job posting, please send an email from
ikavinayagam.p@smartitframe.com with the subject:

DELETE_JOB_ID_5303

to delete@join-this.com.