About this role
Cyber Threat Analyst responsible for monitoring security events, analyzing incidents, and aiding in policy development within a SOC environment. Will hunt for threats, document findings, and mentor junior analysts while maintaining on-call readiness and regulatory compliance.
Key Responsibilities
- Monitor and respond to security events
- Conduct incident analysis
- Document events and findings
- Recommend enhancements and manage security tools
- Proactively hunt threats and support awareness initiatives
Technical Overview
Role covers SIEM, threat intel platforms, SOAR, IDS/IPS, FIM/DLP; implements incident response playbooks; manages identity and access controls and supports compliance with PCI/HIPAA/SOX/GDPR.
Ideal Candidate
The ideal candidate is a mid-level security analyst with 2+ years of security monitoring and incident response experience, proficient in SIEM, SOAR, IDS/IPS, FIM/DLP, and compliance frameworks (PCI/HIPAA/SOX/GDPR), with the ability to mentor junior staff and operate in a 24x7 on-call SOC environment.
Must-Have Skills
SIEMThreat Intelligence PlatformsSecurity automation and orchestration solutions (SOAR)IDS/IPSFile Integrity Monitoring (FIM)Data Loss Prevention (DLP)PCIHIPAASOXGDPRIncident responseVulnerability assessmentsThreat huntingOn-call rotation2+ years of information security monitoring and response experienceExperience with network defenseethical hackingincident responsecomputer forensicsand reverse engineeringEducation: High School Diploma or GED (Required)
Nice-to-Have Skills
UEBASOAR
Tools & Platforms
Security Information and Event Management (SIEM)Threat Intelligence PlatformsSOAR (Security OrchestrationAutomation and Response)IDS/IPSFile Integrity Monitoring (FIM)Data Loss Prevention (DLP)
Required Skills
SIEMSecurity Information and Event ManagementThreat Intelligence PlatformsSOARSecurity OrchestrationAutomation and ResponseIDS/IPSIntrusion Detection SystemFile Integrity MonitoringFIMData Loss PreventionDLPPCIHIPAASOXGDPRIncident ResponseVulnerability AssessmentsThreat Hunting24x7 on-call rotationSecurity PoliciesNetwork DefenseEthical HackingComputer ForensicsReverse Engineering
Hard Skills
SIEMSecurity Information and Event ManagementThreat Intelligence PlatformsSOARSecurity OrchestrationAutomation and ResponseIDS/IPSIntrusion Detection SystemFile Integrity MonitoringFIMData Loss PreventionDLPPCIHIPAASOXGDPRIncident ResponseVulnerability AssessmentsThreat Hunting24x7 on-call rotationSecurity PoliciesNetwork DefenseEthical HackingComputer ForensicsReverse Engineering
Soft Skills
communicationteamworkproblem-solvingattention to detailmentorshipleadershipadaptability
Certifications
Preferred
SANS GCIHSANS GCIASecurity+Network+CISSP
Keywords for Your Resume
Cyber Threat AnalystSIEMSecurity Information and Event ManagementThreat Intelligence PlatformsSOARSecurity OrchestrationAutomation and ResponseIDS/IPSIntrusion Detection SystemFile Integrity MonitoringFIMData Loss PreventionDLPPCIHIPAASOXGDPRIncident ResponseVulnerability AssessmentsThreat Hunting24x7 on-call rotationsecurity policiesnetwork defenseethical hackingcomputer forensicsreverse engineeringon-call rotationNACHA
Deal Breakers
Unwilling to participate in 24x7 on-call rotation, Lacks required High School Diploma or GED, Lacks experience with SIEM or IDS/IPS
Get matched to jobs like this
Luna finds roles that fit your skills and career goals — no endless scrolling required.
Create a Free Profile