Remote - United States; Remote - New Zealand On-site USD 115000-125000/year

Blackpoint Cyber is hiring a Senior MDR Analyst - Swing Shift

About the Role

Role Overview

A Senior Managed Detection and Response (MDR) Analyst is responsible for identifying, analyzing, and responding to cybersecurity threats within a continuous 24×7 Security Operations Center. This position emphasizes independent threat hunting without reliance on external leads, requiring strong analytical capabilities and initiative to detect malicious activity across diverse customer environments.

Key Responsibilities

  • Conduct proactive, lead-less threat hunting to detect anomalies in network and endpoint data across multiple client systems
  • Investigate emerging cyber threats and serve as a technical escalation point for complex intrusion analysis
  • Produce detailed incident reports and coordinate with internal teams and clients to resolve security events
  • Design and implement automation tools to streamline SOC workflows and reduce manual effort
  • Deliver actionable intelligence on threats and vulnerabilities observed during monitoring and analysis
  • Construct test lab environments to study attacker techniques and improve detection capabilities
  • Evaluate sandbox outputs to extract new indicators of compromise and enhance detection rules

Required Qualifications

  • Minimum of five years in information security, with relevant certifications potentially substituting for one year of experience
  • At least two years focused on triaging alerts from EDR and next-generation antivirus platforms, including support for incident response activities
  • Strong proficiency in identifying malicious behavior within Windows systems, including malware, anomalous network traffic, and forensic artifacts
  • Solid working knowledge of at least two operating systems: Windows, Linux, or macOS
  • Experience using the ELK stack for log analysis, dashboard creation, and query development
  • Scripting ability in PowerShell, Python, or Go to support automation and analysis tasks
  • Familiarity with cloud platforms including AWS (EC2, S3, IAM), Azure, and Microsoft 365 services
  • Proven experience developing and executing threat-hunting methodologies to uncover hidden threats
  • Flexibility to work assigned swing shift hours, including evenings and weekends as needed
  • Strong problem-solving, logical reasoning, and communication skills, with the ability to explain technical findings clearly

Preferred Experience

  • Prior work in a Security Operations Center, Threat Hunting, or Digital Forensics and Incident Response (DFIR) capacity

Technology Environment

ELK stack, PowerShell, Python, Go, AWS (EC2, S3, IAM), Azure, Microsoft

Required Skills
ELK stackPowershellPythonGoEDRNGAVAWSAzureM365Sandbox technologiesWindows forensicsThreat huntingIncident ResponseLog analysisOS security EDRNGAVIncident ResponseWindows ForensicsELK StackAWSAzureM365PythonPowershellSandbox Technologies
Need to work legally in Thailand?

Work permits without the paperwork nightmare

Thai immigration rules are strict and easy to get wrong. SVBL handles the bureaucracy — correct visa type, proper documentation, timely submissions. You focus on your work.

Right visa type for your situation
Document preparation & submission
Deadline tracking & renewals
Direct liaison with immigration
Talk to an expert
10+ years experience
About company
Blackpoint Cyber
Leading cybersecurity threat hunting, detection, and remediation technology provider founded by former NSA cyber operations experts, focused on delivering national security-grade technology solutions.
All jobs at Blackpoint Cyber Visit website
Job Details
Department SOC
Category security
Posted 9 days ago