Senior Threat Analyst
Commerce, MI
PDI Technologies
By “Connecting Convenience” across the globe, we empower businesses to increase productivity, make more informed decisions, and engage faster with customers through loyalty programs, shopper insights, and unmatched real-time market intelligence via mobile applications, such as GasBuddy. We’re a global team committed to excellence, collaboration, and driving real impact. Explore our opportunities and become part of a company that values diversity, integrity, and growth.
Role Overview: The Senior Threat Analyst performs in-depth computer security investigations and required actions per the documented incident response lifecycle. This position requires moderate knowledge in areas including security threats and tools, incident investigation, operating systems, and networking. As a Senior Threat Analyst, you will be responsible for monitoring, detecting and responding to security events and incidents to determine root cause analysis. You will be expected to function as a shift lead and help mentor and coach L1 Incident Handlers on investigative techniques and investigation processes. You will gain technical knowledge across attack scenarios and gain experience across multiple security and technology platforms. This opportunity is in a 24x7x365 environment, requiring availability for all shifts including nights, weekends and holidays.
Key Responsibilites
- Conduct triage/categorization of potential Events and Incidents
- Conduct initial evidence collection, case creation, and coordination/hand-off to other teams as necessary
- Conduct full investigations and escalate to higher tiers as necessary
- Respond in a timely manner (within documented SLA and Run Book) to support tickets.
- Contribute to Incident Handling documentation such as standard operating procedures, playbooks, briefings and executive reports
- Utilize SIEM for detection and investigation of security events and incidents
- Utilize case management tools to document and track investigations
- Perform threat mitigation as required.
Required Qualifications
- This position requires at least 2-5 years of security experience
- Moderate incident investigation and response experience
- Moderate knowledge of networking concepts (TCP/IP, Routing, Switching)
- Moderate knowledge of network defenses such as firewalls, IDS/IPS, Proxies
- Moderate experience with scripting
- Moderate knowledge of operating systems such as Windows, Linux, Mac, Unix
- Moderate knowledge of common TCP/IP protocols, OSI Layers 1-7
- Moderate knowledge of common attack vectors
- Moderate knowledge in working in SIEM and EDR platforms
- Familiarity with audit requirements and controls (PCI, HIPAA, SOX, etc.)
- Bachelors Degree in Computer Science, Information Security Assurance, or equivalent work experience
Preferred Qualifications
- Ability to review packets with tools such as Wireshark and TCPdump
- Understanding of MITRE ATT&CK and Cyber Kill Chain frameworks
- Ethical hacking/penetration testing experience
- Moderate understand of different cryptographic algorithms
- Experience in detect and response positions where isolation and containment procedures were used
- Industry Certifications: GIAC, GCIH GMON, OSCP, CISSP, CCNP, CCNA, CompTIA Sec+
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: CCNP CISSP CompTIA Computer Science Cyber Kill Chain EDR Ethical hacking Firewalls GCIH GIAC HIPAA IDS Incident response IPS Linux MITRE ATT&CK Monitoring OSCP Pentesting Scripting SIEM SOX TCP/IP UNIX Windows
Perks/benefits: Career development Competitive pay Team events
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.