×
Register Here to Apply for Jobs or Post Jobs. X
More jobs:

Detection & Response Analyst II

Job in Denver, Denver County, Colorado, 80285, USA
Listing for: Todyl
Full Time position
Listed on 2026-02-16
Job specializations:
  • IT/Tech
    Cybersecurity
Salary/Wage Range or Industry Benchmark: 100000 - 125000 USD Yearly USD 100000.00 125000.00 YEAR
Job Description & How to Apply Below

Detection & Response Analyst II – Todyl

Join to apply for the Detection & Response Analyst II role at Todyl
.

About Us

At Todyl, we are on a mission to protect small and medium‑sized businesses from ever‑changing cyber threats. The Todyl platform fully integrates threat, risk, and compliance management to provide exceptional and affordable unified cybersecurity solutions to MSPs (Managed Service Providers) and their end customers. At the end of the day, we’re here to keep our partners and customers safe and help them manage the risks and comply with regulations.

Protecting others requires a team that works together with trust and cares deeply about carrying out our mission.

About The Role

We are looking for a passionate Detection and Response Analyst to join our Managed Extended Detection and Response (MXDR) team. This role reports to the Director of MXDR and is based in either our Augusta, GA or Denver, CO offices. You will work evening (4 PM–2 AM EST) or overnight (12 AM–10 AM) shifts. In this position, you will directly impact our partners’ security by safeguarding their systems and data.

You’ll work collaboratively, leverage cutting‑edge security tools, and build expertise in security operations and threat intelligence.

Key Responsibilities

  • Monitoring & Reporting:
    Actively monitor alerts and craft technical reports describing the overall activity and root cause of the alert to our partners.
  • Collaborative Work:
    Work closely with other team members to learn, share knowledge, and collaborate on projects and incidents.
  • Automation & Tool Development:
    Independently contribute to internal projects, documentation, and develop new capabilities to automate security operations and enhance overall security.
  • Threat Hunting & Analysis:
    Support proactive threat‑hunting exercises, analyze indicators of compromise (IOCs), and research malware threat families to anticipate and mitigate risks.
  • Incident Response:
    Assist in the triage and investigation of security incidents alongside the Detection Response Account Managers (DRAMS) or Threat Hunters, determining root cause, scope, and impact. Ensure proper hand‑off for incidents requiring containment and recovery.

Qualifications

Values Fit

  • Extreme ownership, particularly when things go wrong or aren’t completed on time.
  • Intrinsic drive for growth; self‑motivated, always learning, and focused on raising the bar for self and team.
  • Strong bias for action with impact; make tough decisions quickly, measure results, and iterate with clarity to move the mission forward.
  • Comfort with ambiguity and change, embracing uncertainty as part of startup life.
  • Humility, purpose over ego to acknowledge mistakes, learn from others, and embrace feedback while putting the mission first.

Who You Are

  • Experience:

    Minimum of two years in cybersecurity, with at least one year focused on security monitoring and incident response.
  • Education &

    Certifications:

    Relevant certifications (GCLD, GCIH, GCFA, GREM, CompTIA Net+, Sec+, CySA+) and/or a bachelor’s degree are preferred.
  • Operating System Knowledge:
    Expertise with Windows OS and command‑line tools. Baseline knowledge of Linux and macOS is preferred.
  • Network & Protocol Knowledge:
    Solid understanding of TCP/IP, core application layer protocols, and basic authentication.
  • Adversary Knowledge:
    Knowledge of and insight into the adversary life cycle from reconnaissance to actions in the environment.
  • Technical Expertise:
    Proficiency in enterprise security tools, including SIEM, EDR, User Behavior Analysis, and familiarity with Zero Trust networking models.
  • Raw Data Analysis:
    Demonstrated experience in analyzing raw data, ability to understand and locate key elements within data.
  • Scripting & Development:
    Demonstrated experience building scripts, tools, or processes/documentation that enhance threat detection and incident response.
  • Cloud & Offensive Security Familiarity:
    Understanding of cloud applications (e.g., O365, Okta) and cloud infrastructure (AWS, GCP, Azure), along with familiarity with offensive security tools and techniques.

What We Offer

For full‑time employees, Todyl offers comprehensive benefits including:

  • Medical, dental, and vision coverage
  • Health savings and flexible spending accounts (HSA/FSA)
  • Life insurance
  • Short‑ and long‑term disability
  • Access to on‑demand healthcare and telehealth services
  • Employee Assistance Program (EAP)
  • Flexible PTO in addition to 13 company holidays
  • 401(k)
  • Generous parental leave programs

All qualified applicants will receive equal consideration. This is a U.S. job posting. Military and veteran status are considered in a non‑discriminatory manner. Join us.

#J-18808-Ljbffr
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary