
Cyber Defense Strategy Analyst
- Hoover, AL
- Permanent
- Full-time
- Analyzes and responds to cyber threats within various security tools according to documented procedures and be capable of understanding if deviations from procedures are necessary to gather the required information to respond
- Proactively identifies opportunities for tuning security tools and submit requests to support teams to enhance threat detection accuracy, and works with related teams to see tuning through to completion
- Provides recommendations for updates to policies, standards, and procedures to improve process flows
- Performs threat hunting and participate as a key stakeholder in tabletop exercises on a rotational job-duty basis as needed
- Assists in incident response
- Maintains meticulous records of all work performed, including root cause analysis, indicators of compromise, remediation steps, timeline of events, and impact assessment using clear and concise annotations as needed
- Mentors, reviews, and assists other analysts in their documentation and training
- Maintains an awareness of active global cybersecurity threat trends and proactively provides guidance where gaps may exist around existing detections and procedures
- Supports and collaborates with various cybersecurity teams to document security posture and assess environment for relevant IOCs and gaps as needed
- Participates in and lead various security assessments (i.e. Security Architecture Reviews, Red Team assessments, Purple Team engagements, and formal tabletop exercises) as needed
- Participates in and lead planning and support for cyber security engineering and architecture for new projects as needed
- Provides in-depth guidance on process improvement
- Acts as a coach and mentor to junior analysts
- Leads special projects
- Serves as a subject matter expert (SME) within cybersecurity
- High School Diploma or GED and (10) years of related post-secondary education and/or experience in Information Security or Information Technology
- Minimum of two (2) relevant certification in Information Security or the ability to obtain relevant certification within twelve months of start date in this position, such as CompTIA Network+/Security+/CySA+, EC-Council Certified Ethical Hacker (CEH), Cisco CCNA/CCNA-Security, GIAC GSEC, etc.
- Familiarity with regulatory requirements and industry standards such as the Gram Leach Bliley Act (GLBA), Payment Card Industry Data Security Standard (PCI-DSS), National Institute of Standards and Technology (NIST), etc.
- Willingness and availability to work on a pre-determined shift and rotational on call
- Minimum of one (1) Intermediate to Advanced Amazon Web Services (AWS) or Azure Architect/Administrator and/or Security specialty certification
- Advanced Incident Response, Cyber Leadership, Penetration Testing certification – GCIH, GSOM, GPEN, CISSP, CISM, OSCP
- Prior working experience in a Security Operations Center (SOC) environment
- Prior experience developing use cases for a Security Operations Center from threat hunting and threat detection engineering to investigation playbook and response procedure development
- Understanding of MITRE ATT&CK Framework and Cyberattack Kill Chain and how these frameworks can be used to identify gaps as well as orient analysts in attack progression
- Ability to be a self-starter with initiative and drive for continuous improvement.
- Ability to be a team-oriented individual who works well with others and places a premium on the group’s success
- Advanced understanding of information security principles, controls, and technologies
- Demonstrated strong organizational, research, analytical and problem-solving skills to evaluate situations and respond appropriately
- Excellent writing and verbal communication skills
- Strong familiarity with concepts related to security disciplines such as: malware analysis, computer forensics, cyber incident response, network intrusion detection, network traffic and packet analysis, penetration testing, vulnerability scanning, compliance, audit, or cyber threat intelligence
- Strong investigative and problem-solving skills
- Strong understanding of cyber threat landscape, including TTPs (Tactics, Techniques, and Procedures) of threat actors.
- Experience working with threat intelligence platforms and using tactical or strategic intel to determine relevant threats and plans of action.
- Familiarity with MITRE ATT&CK/D3FEND/ATLAS frameworks and threat modeling methodologies.
- Proficiency in analyzing indicators of compromise (IOCs), malware, phishing, and network traffic.
- ability to write technical and executive reports and provide verbal briefing or presentations.
- Experience with SIEM tools (e.g., Splunk, Elastic) and log analysis.
- Familiarity with AI technologies, threats, and risk mitigation.
- Paid Vacation/Sick Time
- 401K with Company Match
- Medical, Dental and Vision Benefits
- Disability Benefits
- Health Savings Account
- Flexible Spending Account
- Life Insurance
- Parental Leave
- Employee Assistance Program
- Associate Volunteer Program