Senior Threat Analyst

Remote, United States

SonicWall

Defend SMBs, enterprises and governments from advanced cyber attacks with SonicWall's award-winning firewalls and cyber security solutions.

View all jobs at SonicWall

Apply now Apply later

SonicWall is a cybersecurity forerunner with more than 30 years of expertise and is recognized as a leading partner-first company, ensuring our partners and their customers are never alone in the fight against cybercrime. With the ability to build, scale and manage security across the cloud, hybrid and traditional environments in real-time, SonicWall provides relentless security against the most evasive cyberattacks across endless exposure points for increasingly remote, mobile and cloud-enabled users. With its own threat research center, SonicWall can quickly and economically provide purpose-built security solutions to enable any organization—enterprise, government agencies and SMBs—around the world. For more information, visit www.sonicwall.com or follow us on TwitterLinkedInFacebook and Instagram.

We are looking for a Senior Threat Analyst to join our growing security operations team. This role is critical in proactively identifying, analyzing, and mitigating security threats while providing expert guidance to both internal teams and external partners.

As a Senior Threat Analyst, you will work closely with our SOC Blue and Purple teams, investigating complex security incidents, escalating critical alerts, and mentoring junior analysts. You will play a key role in developing and maintaining security procedures, playbooks, and best practices to enhance the effectiveness of the security operations team.

Key Responsibilities

Threat Detection & Analysis

  • Work with partners to maintain an understanding of security threats, vulnerabilities, and exploits that could impact systems, networks, and assets.
  • Conduct threat hunting and advanced incident investigations to detect and mitigate cyber threats.
  • Actively research current threats, attack vectors, and tactics being exploited in the wild.
  • Actively work with analysts and perform investigations on escalations.

Security Consulting & Partner Collaboration

  • Provide ongoing recommendations to peers and partners on security tuning and best practices.
  • Ability to discuss security posture with multiple clients and make recommendations to improve their holistic security approach.
  • Conduct gap analysis for clients to better their security posture.
  • Perform knowledge transfers, documentation, and training for partners regarding threat mitigation strategies.

Operational Excellence & Process Improvement

  • Assist in maintaining and developing Standard Operating Procedures (SOPs) for the analyst team.
  • Develop and maintain incident response playbooks to standardize and improve security workflows.
  • Work with internal teams to increase efficiency and effectiveness of security analysis provided by the threat analysis team.
  • Provide quality assurance (QA) reviews of security alerts handled by team members.
  • Train new analysts on security tools, methodologies, and investigative techniques.

Escalation & Reporting

  • Investigate high-severity and complex threats, ensuring timely and effective response.
  • Escalate critical security alerts to the VP of Threat Operations when required.
  • Document and report on security incidents, including Root Cause Analysis (RCA) and event timelines.
  • Provide executive briefings and reports on emerging threat trends and security incidents.

Required Qualifications

  • 5+ years of experience in cybersecurity, preferably in threat intelligence, threat hunting, or incident response.
  • Strong experience in SOC or MDR environments with a focus on threat investigations and incident handling.
  • Expertise in cyber threat intelligence (CTI), malware analysis, and adversary tracking.
  • Strong understanding of MITRE ATT&CK, cyber kill chain, and modern attack techniques.
  • Hands-on experience with SIEM, EDR, and XDR platforms.
  • Proficiency in log analysis, packet analysis, and forensic investigations.
  • Familiarity with scripting and automation (Python, PowerShell, or equivalent).
  • Proven experience in professional documentation and reporting, including Root Cause Analysis (RCA) and incident timelines.
  • Excellent written and verbal communication skills, with the ability to translate technical details into executive-level insights.

Preferred Qualifications

  • Certifications such as GCIA, GCTI, GREM, CISSP, OSCP, or similar.
  • Background in reverse engineering malware and TTP analysis.
  • Experience working in a Security Operations Center (SOC), Managed Security Service Provider (MSSP), or enterprise network environment as a point of escalation.

#LI-KB7

#LI-USA

#LI-Remote

#Threat researcher

SonicWall is an equal opportunity employer.  

We are committed to creating a diverse environment and are an equal opportunity employer. All qualified applicants receive consideration for employment without regard to race, color, ethnicity, religion, sex, gender, gender identity and expression, sexual orientation, national origin, disability, age, marital status, veteran status, pregnancy, or any other basis prohibited by applicable law.

At SonicWall, we pride ourselves on recruiting a diverse mix of talented people and providing active security solutions in 100+ countries.

Applicant Privacy Notice

Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  9  2  0

Tags: Automation CISSP Cloud Cyber crime Cyber Kill Chain EDR Exploits GCIA GCTI GREM Incident response Log analysis Malware MITRE ATT&CK OSCP PowerShell Privacy Python Reverse engineering Scripting Security analysis SIEM SOC Threat detection Threat intelligence Threat Research Vulnerabilities XDR

Regions: Remote/Anywhere North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.