×
Register Here to Apply for Jobs or Post Jobs. X

Cyber Security Analyst II

Job in Dover, Kent County, Delaware, 19904, USA
Listing for: Chesapeake Utilities Corporation
Full Time position
Listed on 2025-12-12
Job specializations:
  • IT/Tech
    Cybersecurity, IT Consultant, Information Security
Salary/Wage Range or Industry Benchmark: 60000 - 80000 USD Yearly USD 60000.00 80000.00 YEAR
Job Description & How to Apply Below

Location:
Hybrid - residing within commutable distance to Newark or Dover, DE

What makes us great

At the heart of our Company is a dedication to delivering energy that drives progress. We put people first, work to keep them safe and build trusting relationships.

Your role in our success:

This position will be responsible for protecting the corporation’s critical information and assets by integrating cybersecurity risk management best practices throughout the enterprise. This position will be responsible for detection and analysis of opportunistic and persistent threats, deploying counter measures and conducting risk and vulnerability assessments across the enterprise (including cloud). As a specialist on the Cyber security team, you will participate in detection and response of cyber incidents, assist in recovery of operations and assist in formulating, updating, and communicating short‑and‑long‑term organizational cybersecurity strategies and policies.

In addition, you will provide technical support to others on adjacent technical teams and the greater organization. The ideal candidate will have a thorough understanding of incident response protocol and have an understanding of nation state threat actors and their TTPs.

What you'll be working on:

  • Monitor and analyze security intel generated by company security controls. Lead triage, containment and eradication.
  • Participate in threat hunting activities and “deep dive” analysis to maintain a high degree of awareness on the current threat landscape.
  • Participate in simulated “adversary emulation” exercises and have working knowledge of Red Team tools such as Atomic Red Team and Caldera.
  • Provide effective incident response, by correlating intelligence from IPS systems, endpoints and third parties.
  • Administer security awareness training and enterprise vulnerability management solutions, as required.
  • Administer and maintain leading enterprise commercial endpoint and network based security solutions
  • Develop and produce reports on all activities and incidents to help maintain day to day status,
  • Develop and report on trends, and provide focus and situational awareness on all issues.
  • Maintain documentation for all systems and create user guides and standard operating procedures.
  • Adhere to enterprise change management procedures and corporate security policies, including SLAs for responding to cyber related incidents.
  • Responsible for tuning and filtering of events and information, creating custom views and content using all available tools following an approved methodology and with approval and concurrence from management.
  • Maintain system baselines and configuration management items, including security event monitoring “policies” in a manner determined and agreed to by management.
  • Ensure changes are made using an approval process agreed to in advance.
  • Produce reports identifying significant or suspicious security events to appropriate parties. Include latest security threat information and tie back to specific intrusion sets of nation state actors when possible.

Additional Responsibilities

  • Maintain knowledge of the current threat landscape via OSINT.
  • Maintain proficiency and skills through relevant training, conventions, conferences, and on-the-job training.
  • Interface to third party vendors as necessary for external audits.
  • Manage investigations involving Cyber Security, including the use of specialized software.
  • Create system performance metrics and trending for capacity planning
  • Meet availability and update requirements
  • Ability to travel 10%

Who you are:

  • Bachelor’s Degree in computer engineering, computer science, or other closely related IT discipline OR 5 years of relevant work experience.
  • Must hold one of the following certifications:
    Security+, CEH, GCIH, GREM or CISSP
  • 3 years specialized experience providing technical and end‑user assistance on computer hardware and application software support.
  • 2 years of progressively responsible experience in cyber security analysis, incident response, or related experience.
  • Working knowledge of MITRE ATT&CK and Lockheed Martin’s Cyber Killchain
  • Working knowledge of memory analysis tools and DFIR best practices
  • Experience administering…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary