Cyber Security Analyst
Dash Technologies Inc
IT
Montgomery, AL, USA
Information Security Analyst – Security Operations
Overview:
We are seeking a highly motivated Information Security Analyst to join our Security Operations team. In this role, you will be responsible for monitoring, analyzing, and responding to security events to ensure the protection of organizational systems, applications, and data. The ideal candidate will have experience working in a Security Operations Center (SOC) environment and a strong understanding of threat detection, vulnerability management, and incident response.
Key Responsibilities
- Monitor and analyze security alerts generated by Extended Detection and Response (XDR) and Security Information and Event Management (SIEM) platforms to identify potential threats and determine impact.
- Investigate suspicious activities, security incidents, and anomalous behavior across endpoints, networks, and applications.
- Implement and maintain technical security controls to ensure the confidentiality, integrity, and availability of information assets.
- Participate in vulnerability assessments, penetration testing activities, and application security reviews.
- Conduct regular security monitoring to detect malware activity, unauthorized access, and potential exploitation attempts.
- Support security initiatives throughout the system development life cycle (SDLC) to ensure secure design and implementation.
- Review infrastructure and system changes to validate alignment with security policies and best practices.
- Maintain documentation of security procedures, incident response activities, and security control implementations.
- Collaborate with IT teams and subject matter experts to remediate security vulnerabilities and strengthen overall security posture.
- Promote information security awareness and best practices across the organization.
Required Qualifications
- 4+ years of experience in Information Security or Cybersecurity roles
- Hands-on experience working in a Security Operations Center (SOC) environment
- Strong analytical and problem-solving skills for security monitoring and incident response
- Experience identifying endpoint anomalies, malware activity, and exploitation techniques
- Understanding of social engineering attacks and threat vectors
- Excellent communication and collaboration skills
- Strong ability to prioritize and respond to security incidents in a fast-paced environment
Required Tools & Technologies
- Proofpoint (Targeted Attack Protection, Cloud Threat Response)
- CrowdStrike Falcon EDR
Additional / Preferred Experience
Experience with the following technologies is considered a plus:
- Microsoft Defender XDR
- Microsoft Sentinel (SIEM)
- SonarQube
- Tenable / Tenable SC
- OpenText WebInspect
- Syslog-NG
- Elastic Logstash
Preferred Certifications
- CompTIA Security+
- ISC2 Certified in Cybersecurity (CC)
- Certified Ethical Hacker (CEH)
- Microsoft Security Operations Analyst – SC-200