Cyber Security Analyst AZ
Listed on 2026-02-16
-
IT/Tech
Cybersecurity
****Position Summary
We are seeking an experienced Cyber Security Analyst to join our cybersecurity team. In this critical role, the successful candidate will be tasked with the comprehensive monitoring, detection, analysis, and response to cybersecurity incidents, ensuring the integrity, confidentiality, and availability of information assets. Leveraging deep technical expertise and a strategic approach to cybersecurity, this position calls for a proactive and vigilant professional dedicated to identifying vulnerabilities, mitigating risks, and leading incident response efforts.
The ideal candidate will possess deep technical knowledge, excellent communication skills, and the ability to coordinate incident response activities across the organization. This position requires a blend of analytical prowess, technical expertise, and a strategic mindset to protect the company's assets from internal and external threats
Essential Duties and Responsibilities
- Continuously monitor and evaluate the organization's cybersecurity posture, using security tools and techniques to detect potential threats and vulnerabilities across a wide range ofsystems and environments.
- Respond to, investigate, and manage security incidents with precision and expertise, from initial detection through to resolution, ensuring minimal impact to the organization.
- Serve as a key contributor to the Security Operations team, enhancing its operational capabilities through the development and implementation of security measures and protocols.
- Mentor and guide junior security analysts within the security operations team, fostering aculture of continuous learning and professional development. Share knowledge and insights onthe latest cybersecurity trends, tools, and practices to enhance team capabilities.
- Develop, refine, and maintain incident response playbooks, procedures, and guidelines in alignment with industry best practices.
- Engage in proactive threat hunting initiatives, leveraging threat intelligence and cybersecurityframeworks to identify and neutralize potential threats before they manifest into incidents.
• Document and communicate detailed incident reports and analyses, ensuring transparency and clarity in the post-incident review process to improve future security measures and responses - Stay current with new threats, technologies, and trends in cybersecurity, contributing to the company's IT security strategy and roadmap.
• Participate in continuous improvement activities that enhance operational efficiency through the implementation of automation. - Share knowledge and insights with team members and across the organization to foster aculture of security awareness and resilience
Knowledge, Skills, and Abilities
- Bachelor’s degree in Cyber Security, Information Assurance, Computer Science, Engineering, ora related technical field is preferred or equivalent combination of experience, education(including other relevant degree or educational programs), and certifications.
- Professional security certifications such as GCIH, GCFA, CISSP, or similar are highly desirable
Education & Experience
- 3-5 years of experience in cybersecurity, with a focus on security operations, incident response, or related fields.
- Proven experience in security systems administration, SIEM, threat intelligence platforms,vulnerability management, and forensic tools.
- Strong understanding of cybersecurity principles, IT systems, and network security.
- Demonstrated proficiency in Windows and Linux operating systems, with a solid understanding of cloud services
Excellent communication skills, with the ability to convey complex security concepts to both technical and non-technical stakeholders. - Demonstrated ability to act with integrity, professionalism, and confidentiality.
- Organized, adaptable, and capable of managing multiple high-priority tasks in a fast-paced environment
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).