×
Register Here to Apply for Jobs or Post Jobs. X
More jobs:

Cybersecurity Analyst

Job in Seattle, King County, Washington, 98127, USA
Listing for: Pivotal Consulting
Full Time position
Listed on 2026-01-12
Job specializations:
  • IT/Tech
    Cybersecurity
Salary/Wage Range or Industry Benchmark: 60 - 70 USD Hourly USD 60.00 70.00 HOUR
Job Description & How to Apply Below

Cybersecurity Analyst Seattle, WA (Contract W2 Hourly, Hybrid)

Applicants must be currently authorized to work in the United States on a full-time basis. The employer will not sponsor applicants for work visas. The employer may not have resources available to support STEM OPT training requirements. No C2C - Pivotal does not accept unsolicited applications or resumes from third-party recruiters/agencies.

Why clients choose Pivotal Consulting:

We are a technology management consulting firm helping Fortune 500 companies improve their performance – we specialize in making People, Process, and Technology work together! Our clients count on us to deliver excellence and seek our guidance on business and technology strategy, technology modernization, and cloud transformation initiatives. Simply put, by listening to our clients closely and focusing on delivering quality, we bring them peace of mind.

After guiding and helping numerous clients from global enterprises to mid-market firms to non-profit organizations, we are now experiencing breakthrough growth!

The impact you will have:

As a relationship driven and customer focused professional, you will help us continue providing our clients with the quality of work that they have come to know us by.

About the role:

We are seeking a highly skilled and experienced Cybersecurity Analyst to join our dedicated technology solutions team. This role is a specialized position focused on advanced threat detection, assessment, and the critical function of validating and grading outputs from our security AI and machine learning models. The ideal candidate is a security data expert with deep technical skills in Microsoft's security ecosystem and advanced proficiency in KQL.

What you will do:
  • AI/ML Validation and Refinement: Act as the human-in-the-loop, responsible for tagging, grading, and labeling security data and outcomes generated by AI/ML detection models (e.g., from Microsoft Sentinel, Defender). Provide feedback to data scientists and engineers to continuously improve model accuracy and reduce false positives.
  • Expert Threat Hunting: Proactively and systematically hunt for sophisticated threats across the environment using advanced methodologies. Develop, document, and execute complex threat-hunting queries using KQL (Kusto Query Language) over the Microsoft data lake and Azure security tables (e.g., security events, network flows, process executions).
  • Incident Response and Triage: Serve as an escalation point for complex security alerts. Conduct in-depth analysis of incidents, determine the scope of compromise, and provide clear, actionable containment and remediation recommendations.
  • Data Expertise and Schema Mastery: Maintain expert-level knowledge of Microsoft's security data schemas, including tables within Azure Sentinel/Log Analytics (Security Event, Signin Logs, Device Process Events , etc.) and the wider Microsoft 365 Defender suite.
  • Content Development: Develop high-fidelity custom detection rules, watchlists, hunting queries, and automated playbooks within the Microsoft Sentinel platform.
  • Reporting and Communication: Prepare detailed reports on emerging threats, hunting activities, and the performance metrics of AI models for security leadership and engineering teams.
  • Process Improvement: Identify gaps in current monitoring, detection, and response capabilities and propose solutions to enhance the overall security posture.
What makes you a good fit:
  • Bachelor's degree in Computer Science, Information Security, or a related field, or equivalent practical experience.
  • Minimum of 5 years of experience working in a Security Operations Center (SOC), Threat Intelligence, or Incident Response role.
  • Security Data Proficiency (Expert): Deep understanding of security data types, sources, and log structures necessary for effective analysis and hunting (Windows events, network data, endpoint telemetry, cloud audit logs).
  • KQL Mastery: Advanced, proven expertise in KQL is mandatory, including the ability to write complex, performant, and multi-stage queries (e.g., using join, mv-expand, , ) to extract insights from massive datasets.
  • Microsoft Security Stack

    Experience:

    Extensive…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary