CyberSheath is seeking a Cyber Security Analyst (Tier 2) to join their Security Operations team, focusing on advanced security incident triage and response in Microsoft environments.
CyberSheath Services International LLC is a rapidly growing Security and IT Managed Services Provider primarily focused on providing Cybersecurity services to the Defense Industrial Base (DIB). We are excited to be expanding our staff due to our growth and are looking to add a Cyber Security Analyst to our Security Operations team! CyberSheath integrates compliance and threat mitigation efforts and eliminates redundant security practices that don’t improve and, in fact, may weaken an organization’s security posture. Our professionals tell clients where to stop spending, where to invest, and how to take what they are already doing and integrate it in a way that delivers improved security. Successful candidates for CyberSheath are self-motivated, think out of the box, work, and solve issues independently. Additionally, our most successful people are self-starters and willing to put on many hats in order to succeed. CyberSheath is fast-growing and seeks candidates who want to be part of our upward trajectory. Job Overview The Cyber Security Analyst (Tier 2) is responsible for advanced security incident triage, investigation, and response across Microsoft 365, Azure, and on-premises infrastructure. Serves as the escalation point for complex security incidents while implementing containment and remediation procedures in hybrid environments. Key Responsibilities Investigate and respond to escalated security incidents across Microsoft cloud and on-premises environments Perform advanced incident analysis using Microsoft Defender suite and Azure Sentinel Conduct security assessment of Azure/Microsoft 365 configurations and implement hardening recommendations Analyze and respond to advanced Active Directory attacks (Kerberoasting, Pass-the-Hash, Golden Ticket) Monitor and investigate Exchange Server logs, email flow patterns, and phishing campaigns Analyze federation security including ADFS token-based attacks and SAML token manipulation Configure and tune WAF/firewall rule sets and investigate related security incidents Develop network segmentation strategies and identify lateral movement attempts Develop and maintain incident response playbooks for various attack scenarios Coordinate incident response activities with cross-functional teams Required Qualifications 3-5 years in cybersecurity with 2+ years SOC experience Deep knowledge of hybrid Microsoft environments (Microsoft 365, Azure, on-premises AD) Experience with SIEM platforms and security monitoring tools Scripting proficiency (PowerShell, Python) Strong analytical and communication skills Microsoft Certified: Security Operations Analyst (SC-200) One additional security certification: EC-Council CSA, CompTIA Security+, or similar Preferred Qualifications Microsoft Certified: Azure Security Engineer (AZ-500) Microsoft Certified: Identity and Access Administrator (SC-300) CrowdStrike Certified Falcon Responder (CCFR) or equivalent EDR certification CISSP, SSCP, CCSP Skills & Expertise Strong Proficiency with Microsoft Defender suite (Endpoint, Office 365, Identity, Cloud Apps) Azure Sentinel KQL query development and alert configuration Azure AD/Entra ID security configuration and attack path analysis Active Directory security assessment including GPOs, trust relationships, and delegation Email security and phishing detection/response Cloud security posture management Incident handling and digital forensics Threat intelligence analysis and implementation Work Environment CyberSheath is a fully remote organization, and this will be a work-from-home position This schedule for this role entails working every other weekend. Travel requirements: 0-5% yearly. CyberSheath is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender identity, national origin, age, protected veteran status, among other things, or status as a qualified individual with a disability. Budgeted Pay Range$70,000—$100,000 USD
NavitsPartners is seeking a Cyber Security Engineer with expertise in Identity and Privileged Access Management (IAM/PAM) for a 6-12 month onsite role in Detroit, Michigan. The role involves deploying and managing IAM and PAM tools, supporting automation, and enhancing cloud security initiatives.
MANTECH is seeking a Senior Cybersecurity Analyst in Miami, Florida, to monitor and secure information systems while developing strategies to prevent security incidents. The role involves conducting audits, implementing security policies, and mentoring junior staff.
CyberSheath is seeking a Cyber Security Analyst (Tier 2) to join their Security Operations team, focusing on advanced security incident triage and response in Microsoft environments.
Vizio Group is seeking a Principal Systems and Infrastructure Engineer specializing in Information Security to lead the migration of applications and databases from AWS to Azure in Denver, CO. The role involves architecting Infrastructure-as-Code solutions, driving containerization, and developing automation scripts.
Morgan Stanley is hiring multiple Cybersecurity Data Analysts and Cybersecurity DevOps Engineers in Baltimore, Maryland. These roles focus on enhancing cybersecurity measures and managing risks related to AI and LLM systems.
Ascot Group is seeking a Cybersecurity Defense SOC Analyst (L2) to enhance their 24x7 Cybersecurity Defense function. The role involves investigating security incidents, improving detection content, and collaborating with internal teams and Managed Security Service Providers.
NavitsPartners is seeking a Cyber Security Engineer with expertise in Identity and Privileged Access Management (IAM/PAM) for a 6-12 month onsite role in Detroit, Michigan. The role involves deploying and managing IAM and PAM tools, supporting automation, and enhancing cloud security initiatives.
MANTECH is seeking a Senior Cybersecurity Analyst in Miami, Florida, to monitor and secure information systems while developing strategies to prevent security incidents. The role involves conducting audits, implementing security policies, and mentoring junior staff.
CyberSheath is seeking a Cyber Security Analyst (Tier 2) to join their Security Operations team, focusing on advanced security incident triage and response in Microsoft environments.
Vizio Group is seeking a Principal Systems and Infrastructure Engineer specializing in Information Security to lead the migration of applications and databases from AWS to Azure in Denver, CO. The role involves architecting Infrastructure-as-Code solutions, driving containerization, and developing automation scripts.
Morgan Stanley is hiring multiple Cybersecurity Data Analysts and Cybersecurity DevOps Engineers in Baltimore, Maryland. These roles focus on enhancing cybersecurity measures and managing risks related to AI and LLM systems.
Ascot Group is seeking a Cybersecurity Defense SOC Analyst (L2) to enhance their 24x7 Cybersecurity Defense function. The role involves investigating security incidents, improving detection content, and collaborating with internal teams and Managed Security Service Providers.
NavitsPartners is seeking a Cyber Security Engineer with expertise in Identity and Privileged Access Management (IAM/PAM) for a 6-12 month onsite role in Detroit, Michigan. The role involves deploying and managing IAM and PAM tools, supporting automation, and enhancing cloud security initiatives.
MANTECH is seeking a Senior Cybersecurity Analyst in Miami, Florida, to monitor and secure information systems while developing strategies to prevent security incidents. The role involves conducting audits, implementing security policies, and mentoring junior staff.
CyberSheath is seeking a Cyber Security Analyst (Tier 2) to join their Security Operations team, focusing on advanced security incident triage and response in Microsoft environments.