Cybersecurity Analyst
San Antonio, TX, US
Dragonfli Group
Description
Company Overview:
Dragonfli Group LLC is a Washington, DC-based consulting firm specializing in cybersecurity and IT services. We support government agencies and large commercial enterprises, offering expertise in cyber defense, threat intelligence, and security operations.
Job Summary:
Dragonfli Group is seeking skilled Cyber Defense Analysts to provide cybersecurity monitoring and threat analysis. This role requires prior experience in a cybersecurity operations center (SOC), cyber threat hunting, and expertise in identifying and mitigating security threats. The analysts will support 24/7/365 security operations, with positions available for both standard business hours (Monday to Friday) and rotating 12-hour shifts for continuous coverage. This position is fully on-site in San Antonio, Texas.
Key Responsibilities:
- Perform real-time monitoring, detection, and analysis of potential cyber threats using security tools.
- Conduct proactive cyber threat hunting to identify advanced threats within the enterprise network.
- Analyze network traffic, system logs, and security alerts to differentiate between legitimate activity and potential threats.
- Create and maintain a common intelligence picture, integrating threat intelligence sources.
- Develop and refine security incident detection methodologies and alerting criteria.
- Document and escalate security incidents, including event history, status, and potential impact.
- Utilize cyber defense tools for continual monitoring and analysis of security events.
- Identify and assess threat tactics, techniques, and procedures (TTPs) employed by adversaries.
- Perform event correlation using information from multiple sources to gain situational awareness.
- Generate daily summary reports on security events, threat activities, and emerging risks.
- Coordinate with enterprise-wide cybersecurity teams to validate and respond to network alerts.
- Provide expertise in writing, reviewing, and editing cyber intelligence assessments.
- Optimize and tune cybersecurity tools to reduce false positives and improve detection capabilities.
Office Address
NoneRequirements
Required Qualifications & Experience:
- Prior experience working in a SOC environment with hands-on cybersecurity monitoring and response.
- Cyber threat hunting experience with demonstrated ability to proactively detect and neutralize threats.
- Strong analytical skills to identify cyber threats and evaluate their potential impact.
- Experience with security tools such as SIEMs (Splunk, ELK, ArcSight), EDR (CrowdStrike, SentinelOne), and network forensics tools.
- Knowledge of cyber threat intelligence frameworks such as MITRE ATT&CK.
- Experience in writing and reviewing cyber intelligence reports and security assessments.
- Familiarity with common attack vectors, malware analysis, and incident response processes.
- Strong verbal and written communication skills.
- Relevant certifications (e.g., Security+, CEH, GCIH, CISSP) are preferred.
Skill(s)
NoneBenefits
Insurance - health, dental, and vision
PTO
401K and employer match
Travel
NoneSalary
None* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: ArcSight CEH CISSP CrowdStrike Cyber defense EDR ELK Forensics GCIH Incident response Malware MITRE ATT&CK Monitoring Security assessment SIEM SOC Splunk Threat intelligence TTPs
Perks/benefits: 401(k) matching Health care Team events
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.