Cybersecurity Analyst

San Antonio, TX, US

Apply now Apply later

Description

Company Overview:

Dragonfli Group LLC is a Washington, DC-based consulting firm specializing in cybersecurity and IT services. We support government agencies and large commercial enterprises, offering expertise in cyber defense, threat intelligence, and security operations.

Job Summary:

Dragonfli Group is seeking skilled Cyber Defense Analysts to provide cybersecurity monitoring and threat analysis. This role requires prior experience in a cybersecurity operations center (SOC), cyber threat hunting, and expertise in identifying and mitigating security threats. The analysts will support 24/7/365 security operations, with positions available for both standard business hours (Monday to Friday) and rotating 12-hour shifts for continuous coverage. This position is fully on-site in San Antonio, Texas.

Key Responsibilities:

  • Perform real-time monitoring, detection, and analysis of potential cyber threats using security tools.
  • Conduct proactive cyber threat hunting to identify advanced threats within the enterprise network.
  • Analyze network traffic, system logs, and security alerts to differentiate between legitimate activity and potential threats.
  • Create and maintain a common intelligence picture, integrating threat intelligence sources.
  • Develop and refine security incident detection methodologies and alerting criteria.
  • Document and escalate security incidents, including event history, status, and potential impact.
  • Utilize cyber defense tools for continual monitoring and analysis of security events.
  • Identify and assess threat tactics, techniques, and procedures (TTPs) employed by adversaries.
  • Perform event correlation using information from multiple sources to gain situational awareness.
  • Generate daily summary reports on security events, threat activities, and emerging risks.
  • Coordinate with enterprise-wide cybersecurity teams to validate and respond to network alerts.
  • Provide expertise in writing, reviewing, and editing cyber intelligence assessments.
  • Optimize and tune cybersecurity tools to reduce false positives and improve detection capabilities.

Office Address

None

Requirements

Required Qualifications & Experience:

  • Prior experience working in a SOC environment with hands-on cybersecurity monitoring and response.
  • Cyber threat hunting experience with demonstrated ability to proactively detect and neutralize threats.
  • Strong analytical skills to identify cyber threats and evaluate their potential impact.
  • Experience with security tools such as SIEMs (Splunk, ELK, ArcSight), EDR (CrowdStrike, SentinelOne), and network forensics tools.
  • Knowledge of cyber threat intelligence frameworks such as MITRE ATT&CK.
  • Experience in writing and reviewing cyber intelligence reports and security assessments.
  • Familiarity with common attack vectors, malware analysis, and incident response processes.
  • Strong verbal and written communication skills.
  • Relevant certifications (e.g., Security+, CEH, GCIH, CISSP) are preferred.

Skill(s)

None

Benefits

Insurance - health, dental, and vision

PTO

401K and employer match

Travel

None

Salary

None
Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  1  2  0
Category: Analyst Jobs

Tags: ArcSight CEH CISSP CrowdStrike Cyber defense EDR ELK Forensics GCIH Incident response Malware MITRE ATT&CK Monitoring Security assessment SIEM SOC Splunk Threat intelligence TTPs

Perks/benefits: 401(k) matching Health care Team events

Region: North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.