×
Register Here to Apply for Jobs or Post Jobs. X

Cyber Threat Detection - Defense Analyst

Job in Jacksonville, Duval County, Florida, 32290, USA
Listing for: EY
Full Time position
Listed on 2026-02-15
Job specializations:
  • IT/Tech
    Cybersecurity, Information Security, Network Security, Security Manager
Salary/Wage Range or Industry Benchmark: 80000 - 100000 USD Yearly USD 80000.00 100000.00 YEAR
Job Description & How to Apply Below
Position: Cyber Threat Detection - Active Defense Analyst

At EY, we’re all in to shape your future with confidence. We’ll help you succeed in a globally connected powerhouse of diverse teams and take your career wherever you want it to go. Join EY and help to build a better working world.

Overview

The Active Defense team is responsible for four core areas:
Network Reconnaissance, Proactive Penetration Testing (Purple Team), Anomaly Analysis, and Trapping and Coercion. This function allows the Cyber Defense Team to fortify and mature the firm’s enterprise security. In an Active Defense Analyst, we are looking for someone who has experience in Information Security and wants to take the next step in the adventure. In its purple team capacity, candidates will be expected to emulate attacker behaviors and devise strategies to disrupt the actions of an attacker, thus enhancing the abilities of defensive teams.

In the threat hunting capacity, the analyst will identify security vulnerabilities through analysis of event data from SIEM and other relevant tools. You will report findings to technical and non-technical audiences, and collaborate with other teams identify and remediate vulnerabilities.

Responsibilities
  • Perform research and analysis of attacker techniques and methodologies, and emulate those attacks in a collaborative and controlled environment
  • Identify security breaches through ‘Hunting’ operations within a SIEM, full packet capture, EDR, and other tools and treat intelligence
  • Identify patterns consistent with sophisticated attacker methodologies, and report on security concerns as they are escalated or identified
  • Analyze artifacts collected during a security test or passive investigation
  • Communicate with server owners, system custodians, and IT contacts to pursue security testing activities, including: obtaining access to systems, digital artifact collection, and containment and/or remediation actions
  • Create presentations in MS Word, PowerPoint, and/or Excel that support findings
  • Maintain, manage, improve and update security testing process and protocol documentation
  • Assist in analyzing findings, and develop fact based reports
  • Identify means to disrupt attacker actions, and enhance defender response capabilities
Qualifications

To qualify for the role, you must have:

  • 6+ years of relevant experience in one or more of the following areas: threat intelligence, intrusion analysis, incident response, malware analysis, security and network operations, penetration tester, or similar roles
  • Demonstrated understanding of the threat intelligence life cycle, network threats, attacks, attack vectors and methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs)
  • Knowledgeable in security incident response process, procedures, and life-cycle, including performing security audits as part of red team
  • Good understanding of both Windows and Unix/Linux based operating systems
  • Understanding of IP networking concepts, to include addressing, routing, common protocol usage, use of proxies, load balancers, firewalls, routers, and switches in network architecture
  • Global mind-set for working with different cultures and backgrounds
  • Demonstrated integrity and judgment within a professional environment
  • Ability to appropriately balance work/personal priorities
  • Teaming skills as well as ability to work independently on taskings
  • Good social, communication, and writing skills
  • Qualifications, Certifications and Education requirements:
    • Associates Degree and/or any of the following certifications: GPEN, CISSP, Security+, GCIH, OSCP, GCFE, CFCE, other relevant GIAC certs
    • Familiarity with EDR, SIEM, Scripting, Malware Analysis
  • Preferred:
    • Some hands-on experience as an administrator configuring one or more of SIEM, Endpoint Protection, Vulnerability Scanners, or Data Loss Prevention
    • Proficient with one or more scripting languages such as Perl, Python, Power Shell etc. in a threat intelligence or incident response environment
Supervising Responsibilities
  • However, the role requires mentoring, collaboration, and training of more junior associates
  • On rare occasions, may be required to work nights or weekends in support of incident response or penetration audits
What We…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary