Cybersecurity Analysts
Scottsdale, Arizona
Full Time
$120k - $145k
Our client is a Managed Security Service Provider looking to bring on a Cybersecurity Analyst to join their growing team. This position is ideal for someone who thrives in complex and fast-moving environments, enjoys solving technical puzzles, and is passionate about proactive security. This is a client-facing position where you will be responsible for providing Managed Detection and Response (MDR) services and performing in-depth threat hunting and forensic analysis across diverse networks and environments.
This role requires a candidate who is capable of working independently, engaging directly with clients, and offering continuous improvements to their security posture. You will work with several clients simultaneously, acting as an extension of their internal security teams while using advanced tools for detection, investigation, and response.
Required Skills & Experience
-
• Minimum of 3 years of experience in cyber incident response, ideally in external or multi-company environments
-
• Minimum of 3 years of proactive threat hunting experience within network traffic and Endpoint Detection and Response (EDR) tools
-
• Experience handling complex cases such as ransomware or large-scale intrusions
-
• Deep technical familiarity with network traffic analysis and packet capture techniques
-
• Ability to analyze logs from Windows systems, firewalls, and other network devices
-
• Hands-on experience with scripting and automation, preferably in Python or PowerShell
Desired Skills & Experience
-
Previous background as a systems administrator in Windows, Linux, or network environments
-
• Exposure to open-source security tools and technologies used in forensics and packet analysis
-
• Experience with EDR tools such as CrowdStrike, SentinelOne, FireEye, or Sophos
-
• Strong understanding of network forensics, threat intelligence, and how to act on findings
-
• Familiarity with SOAR platforms or automation in security operations
-
• A personal home lab or history of continuous self-education in cybersecurity through research, articles, or training
What You Will Be Doing
Tech Breakdown
-
40% Threat Hunting and Incident Response
-
35% EDR and Networking Forensics
-
25% Scripting, Automation, and Security Process Development
Daily Responsibilities
-
40% Perform daily proactive threat hunting across client environments using both proprietary and open-source tools
-
25% Conduct forensic analysis of network traffic and endpoint data to identify and mitigate threats
-
20% Work directly with assigned clients as part of their extended security teams, providing daily communication and reporting on findings
-
10% Collaborate with internal engineers to share insights, refine processes, and develop new detection capabilities
-
5% Participate in weekly team sessions to discuss emerging threats, new tools, and findings from ongoing investigations