Role Overview
A Senior Managed Detection and Response (MDR) Analyst is responsible for identifying, analyzing, and responding to cybersecurity threats within a continuous 24×7 Security Operations Center. This position emphasizes independent threat hunting without reliance on external leads, requiring strong analytical capabilities and initiative to detect malicious activity across diverse customer environments.
Key Responsibilities
- Conduct proactive, lead-less threat hunting to detect anomalies in network and endpoint data across multiple client systems
- Investigate emerging cyber threats and serve as a technical escalation point for complex intrusion analysis
- Produce detailed incident reports and coordinate with internal teams and clients to resolve security events
- Design and implement automation tools to streamline SOC workflows and reduce manual effort
- Deliver actionable intelligence on threats and vulnerabilities observed during monitoring and analysis
- Construct test lab environments to study attacker techniques and improve detection capabilities
- Evaluate sandbox outputs to extract new indicators of compromise and enhance detection rules
Required Qualifications
- Minimum of five years in information security, with relevant certifications potentially substituting for one year of experience
- At least two years focused on triaging alerts from EDR and next-generation antivirus platforms, including support for incident response activities
- Strong proficiency in identifying malicious behavior within Windows systems, including malware, anomalous network traffic, and forensic artifacts
- Solid working knowledge of at least two operating systems: Windows, Linux, or macOS
- Experience using the ELK stack for log analysis, dashboard creation, and query development
- Scripting ability in PowerShell, Python, or Go to support automation and analysis tasks
- Familiarity with cloud platforms including AWS (EC2, S3, IAM), Azure, and Microsoft 365 services
- Proven experience developing and executing threat-hunting methodologies to uncover hidden threats
- Flexibility to work assigned swing shift hours, including evenings and weekends as needed
- Strong problem-solving, logical reasoning, and communication skills, with the ability to explain technical findings clearly
Preferred Experience
- Prior work in a Security Operations Center, Threat Hunting, or Digital Forensics and Incident Response (DFIR) capacity
Technology Environment
ELK stack, PowerShell, Python, Go, AWS (EC2, S3, IAM), Azure, Microsoft
