Cyber Analyst

AI overview

Join a proactive team to monitor and manage advanced EDR and XDR platforms, respond to security threats, and contribute to incident response and threat analysis.

At TechBiz Global, we are providing recruitment service to our TOP clients from our portfolio.
We are currently looking for a highly proactive and detail-oriented Cyber Analyst to join one of our
clients' teams. If you're looking for an exciting opportunity to grow in a innovative environment, this could be the perfect fit for you.

Job Responsibilities

  • Monitor and manage EDR (Endpoint Detection and Response) and XDR (Extended Detection and Response) platforms to identify, analyze, and respond to security threats in real time.

  • Perform continuous security monitoring within the Security Operations Center (SOC) environment, handling a high volume of alerts from endpoints, networks, and cloud infrastructures.

  • Analyze security logs, alerts, and telemetry data to detect suspicious activity, malware, and potential breaches.

  • Investigate, triage, and respond to security incidents, following established incident response procedures and escalation paths.

  • Conduct threat analysis and root cause investigations to determine impact, scope, and remediation actions.

  • Collaborate with SOC team members and other IT/security teams to contain, remediate, and prevent recurring incidents.

  • Maintain accurate incident documentation and ensure proper case management within ticketing systems.

  • Produce daily and weekly security reports, summarizing alerts, incidents, trends, and response actions for management and stakeholders.

  • Continuously tune and optimize detection rules, alerts, and workflows to reduce false positives and improve detection efficiency.

  • Stay informed on emerging threats, attack techniques, and industry best practices to enhance overall security posture.

Requirements

  • Proficiency in EDR/XDR platforms for continuous endpoint surveillance, behavioral analysis, and event correlation via SIEM tools.

  • ​Expertise in threat hunting, alert triage, false positive qualification, and initial remediation like endpoint isolation or domain blocking.

  • ​Knowledge of network protocols, logs (Syslog, Windows Events), scripting (PowerShell), and Cyber Threat Intelligence (CTI) for threat contextualization

  • Bachelor's or Master's degree (Bac+3 equivalent) in cybersecurity, IT, or related fields, plus certifications, vendor-specific ESET, Trellix, Barracuda, SentinelOne, Fortigate.

  • 2-5 years in SOC Tier 1/2 roles, with hands-on experience triaging alerts on EDR/XDR consoles to minimize noise.

  • Ongoing training in advanced threats (EDR, XDR, MDR) to progress to senior positions.

Ace your job interview

Understand the required skills and qualifications, anticipate the questions you may be asked, and study well-prepared answers using our sample responses.

Analyst Q&A's
Report this job
Apply for this job