User
Write something
(Remote) Security Analyst I | Pay: $55k - $68k/yr.
Location: McLean, VA How You’ll Make An Impact As a Security Analyst I, you'll be our first line of defense against cyber threats. You'll swiftly respond to security alerts, investigate potential malicious activity, secure compromised accounts, and review change activity to prevent or minimize security events. By managing routine security tool adjustments and escalating complex issues, you'll ensure our defenses remain effective and responsive, safeguarding our client's assets and data. Location and Work Expectations - This is a remote position; however, team members should be willing and able to travel if the need arises, though such travel is expected to be infrequent. Candidates with proximity to one of our Centers of Excellence are preferred (Lombard, IL; McLean, VA; Shreveport, LA; Overland Park, KS). - 4 days on, 3 days off! Monday-Thursday, 4pm-3am EST(10-hour shifts). - This role also includes participation in a rotating on-call schedule. What You Will Be Doing - Monitor & Investigate: Actively monitor security dashboards, queues, and alerts from various sources (automated tools, escalated tickets) to detect potential threats. - Incident Triage & Response: Conduct initial investigations into security alerts, perform rapid response actions like securing user accounts, and collect necessary log data for analysis. - Escalate Effectively: Analyze findings to determine the scope and severity of incidents, resolving straightforward issues and escalating complex cases to Level 2 Analysts with clear, concise information. - Security Tool Management: Review and implement authorized, routine changes to security tools, such as processing client exemption requests in the EDR or temporarily adjusting settings for testing. - Collaborate with the Security Team: Work closely with fellow analysts and security engineers, sharing information, participating in team discussions, and contributing to a collaborative security environment. - Engage with Users/Clients: Communicate professionally and clearly with end-users or clients to gather details about potential security issues, explain security procedures, and provide guidance during incident resolution. - Liaise Across Departments: Interact effectively with other teams (e.g., Reactive Support, Client Strategy, NOC) to coordinate security responses and share necessary information. - Document Actions: Maintain accurate and detailed records of investigations, actions taken, communications, and resolutions within ConnectWise. - Provide Support: Offer timely and helpful support related to security inquiries, upholding a professional and customer-service-oriented approach in all interactions.
(Remote) Associate SOC Analyst| Pay: $60k - $72k/yr.
Location: United States About the job A future cyber security expert! You're passionate about security and ready to dive in, using your growing technical skills to help protect client data and infrastructure from threats. Day-to-day, you’ll focus on monitoring, initial investigation, and following established procedures, while leveraging the expertise of your team to solve problems and learn new things.We are seeking an associate Security Analyst in our rapidly growing and dynamic shared services team. The ideal candidate will effectively manage security incidents by monitoring, investigating, and identifying the root causes, and recommend effective mitigation strategies. This position offers the opportunity to work with cutting-edge security tools. The role is highly analytical and requires a proactive, detail-oriented mindset to protect critical infrastructure and data. What You'll Do: - Monitor and analyze log data, network traffic, and/or alerts generated by a variety of security technologies in real-time. - Respond, triage, and escalate security incidents using a SIEM platform following documented procedures. - Support the execution of vulnerability scans and assist in analyzing results for remediation recommendations. - Draft security incident reports detailing the threat, its characteristics, and required remediation activities for review by a senior analyst. - Research new threats and ensureappropriate detection capabilities are in place. - Review security incidents and other deliverables for adherence to established procedures and provide documentation updates as necessary. - Contribute to the quality and timeliness of the security incident detection and classification service. - Ensure standards and procedures are adhered to within defined SLA’s. - Articulate security issues to customers, both verbally and written - Referring difficult or complex issues to more experienced staff. - Developing an understanding of current vulnerabilities, attacks, and countermeasures. - Identify opportunities for process improvement and suggest them to stakeholders - Manage and track customer issues and requests within a ticketing system. - Work within a 24x7x365 team to further support the timely delivery of monitoring services. - This position may be assigned to a rotating shift schedule. - Support other teams as needed.
(Remote) Threat Intelligence Analyst in NY!! | Pay: $35 - $60/hr.
About The Role We partner with the world's leading AI research teams and labs to build and train cutting-edge AI models — and we need experienced threat intelligence professionals to help us get it right. As a Threat Intelligence Analyst, you'll apply your real-world expertise in adversary tracking, campaign analysis, and CTI workflows to help train and evaluate AI systems that need to understand how cyber threats actually work. Your knowledge of what separates genuine attacker behavior from noise is exactly what frontier AI needs. - Organization: Alignerr - Type: Hourly Contract - Commitment: 10–40 hours/week What You'll Do - Analyze and classify threat reports, adversary campaigns, and attacker behavior across realistic scenarios - Evaluate indicators of compromise, TTPs, and end-to-end attack narratives for accuracy and consistency - Generate, structure, and validate threat intelligence data used to train and benchmark AI systems - Review AI-generated cybersecurity outputs and flag inaccuracies, gaps, or fabricated detail - Apply frameworks like MITRE ATT&CK to assess the quality and realism of AI reasoning about threats Who You Are - 2+ years of hands-on experience in threat intelligence, SOC operations, or security analysis - Familiar with MITRE ATT&CK, OSINT collection methodologies, or CTI workflows - Able to distinguish real attacker behavior from synthetic, noisy, or fabricated data - Strong analytical and written communication skills — you can explain complex threat activity clearly - Self-directed and comfortable working asynchronously on task-based assignments Nice to Have - Experience writing threat intelligence reports or briefings - Familiarity with threat hunting, malware analysis, or incident response - Prior exposure to AI evaluation or data annotation workflows Apply today to make it count! Comment “JOB” and I’ll send you the link to apply!
0
0
(Remote) System Administrator | Pay: $100k - $110k/yr.
Location: Sacramento, CA Skills & Qualifications Required - Administration and maintenance of virtual and physical servers - Independently research solutions and actively partner with business groups to proactively move work efforts to completion - Configuring, and Administering operating systems - Detect, diagnose and resolve or escalate system issues arising within the system architecture - Monitor and report system security, performance and events utilizing system monitoring tools. - Prepare, deliver and maintain documentation relevant to systems utilized - Provide technical guidance to Tier 2 and Tier 3 support teams Apply today to make it count! Comment “JOB” and I’ll send you the link to apply!
0
0
(Remote) System Administrator
Location: Minnesota The Role As a Senior Systems Administrator on our Tech Excellence Team within the Technology Change Business Unit, you'll be an escalation point of contact for our clients, providing advanced technical support that keeps them running smoothly-interacting with clients via phone, email, portal, or Live chat (Teams) to resolve technology problems related to our catalog of products and services. This role is also responsible to ensure the proactive maintenance and monitoring of client infrastructure and systems is fully operational and that client service systems and solutions are configured and delivered in scope and on time. Your Responsibilities System and Network Administration: - Manage and maintain slashBlue client's systems through reactive and proactive measures & maintenance - Install and configure software updates on internal and slashBlue client systems - Manage and maintain slashBlue client backup solutions to restore and protect user information - Configure, manage, and support firewalls, VLANs, routing, switching, site-to-site & client VPNs - Troubleshoot connectivity, latency, and security issues on client networks - Assist in the remediation of internal and slashBlue client data and systems based on cybersecurity audit results - Assist in creation & updating of accurate system diagrams & workflow maps for supported client systems Technology Resolution Expertise: - Assist the Help Desk team in timely closure of support tickets with superior customer service - Listen actively to understand client issues and concerns, then remove obstacles for our clients, whether they're skill-based, emotional, or technical. - Provide on & off-site support to slashBlue clients according to our Client Service Expectations, as needed - Required participation in rotating, scheduled Escalation & After Hours On-Call POC - Provide ownership, knowledge, and efforts to solve & prevent repeat client technical issues & problems - Create and maintain accurate documentation for our internal knowledge base
0
0
1-30 of 274
BowTiedCyber Hoodies
skool.com/bowtiedcyber
Leaderboard (30-day)
Powered by