Cybersecurity Analyst
Protecting digital assets through proactive threat analysis and incident response.

Role Overview
As a Cybersecurity Analyst, you will be at the forefront of our organization’s security operations, monitoring network traffic, analyzing security incidents, and implementing protective measures against cyber threats. This role requires a keen eye for detail, strong analytical skills, and the ability to respond quickly to security incidents.
You will work closely with our Security Operations Center (SOC) team to maintain 24/7 security monitoring and ensure rapid response to potential threats. This position offers excellent opportunities for professional growth in the rapidly evolving cybersecurity landscape.
Key Responsibilities
Monitor security events and alerts using SIEM tools and other security monitoring platforms to identify potential threats and anomalies.
Investigate and analyze security incidents, documenting findings and coordinating response efforts with relevant stakeholders.
Conduct vulnerability assessments and penetration testing to identify security weaknesses in systems and applications.
Develop and maintain security policies, procedures, and incident response playbooks to ensure consistent security practices.
Collaborate with IT teams to implement security controls and ensure compliance with industry standards and regulations.
Stay current with emerging threats, security trends, and best practices through continuous learning and professional development.
Required Qualifications
Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or related field, or equivalent professional experience.
3+ years of experience in cybersecurity or information security roles with hands-on experience in threat analysis and incident response.
Strong knowledge of security frameworks (NIST, ISO 27001), network protocols, and common attack vectors.
Experience with SIEM tools, vulnerability scanners, and other security monitoring and analysis tools.
Relevant certifications such as Security+, GCIH, CySA+, or similar cybersecurity credentials preferred.
