Need on W2 only. Job Title: Principal / Lead Cybersecurity Analyst Location: Greensboro, NC (Hybrid, 2-3x per week) JOB DESCRIPTION As a Principal Cybersecurity Analyst , you will be a senior technical leader within the Global Cybersecurity Operations Center ( CSOC ). This role combines expert - level hands - on incident response, advanced threat hunting, & digital forensics with strategic cybersecurity leadership. Need to play a critical role in shaping CSOC strategy, working alongside the Head of CSOC to refine detection, response, & intelligence capabilities to proactively defend against emerging threats. As a recognized subject matter expert ( SME ), you are expected to stay ahead of cyber threat trends, attack methodologies, & adversary tactics, ensuring the CSOC is future - ready & resilient against evolving cyber threats. Responsibilities: • Strategic Threat Defense & Security Roadmap • Work closely with the Head of CSOC to define & refine CSOC strategy to address emerging cybersecurity threats • Continuously evaluate & enhance detection & response frameworks, aligning with business risk & threat landscape evolution. • Lead SOC maturity initiatives, driving automation, advanced analytics, & intelligence - driven security operations. • Develop KPIs & CSOC performance metrics to measure effectiveness & resilience against modern cyber threats. • Act as a trusted advisor to executive leadership, Enterprise IT Security (ITS ) teams, & business stakeholders on cyber risk & response strategies • Advanced Incident Response & Threat Hunting • Serve as the highest - level escalation point for complex cybersecurity incidents, including nation - state APTs, ransomware, & insider threats. • Conduct proactive threat hunting using behavioral analytics, anomaly detection, & adversary tracking. • Perform deep forensic investigations into network intrusions, malware infections, & cloud-based threats. • Develop custom SIEM detection logic, EDR rules, & network security signatures to enhance threat visibility. • Correlate threat intelligence ( TI ), security logs, & endpoint telemetry to identify persistent threats & attack patterns. • Cyber Threat Intelligence & Emerging Threat Research • Stay up to date with the latest cybersecurity news, APT activities, vulnerabilities, & exploit trends. • Drive threat modeling exercises to anticipate & counter evolving adversary tactics, techniques, & procedures ( TTPs ). • Lead adversary tracking initiatives, mapping threats to MITRE ATT&CK, Cyber Kill Chain, & TIBER - EU frameworks. • Collaborate with global threat intelligence teams to curate & integrate high-value threat intelligence into CSOC operations. Minimum Qualifications: Education & Experience • Bachelor’s or Master’s degree in Cybersecurity, Computer Science, or a related field. • 10+ years of hands - on cybersecurity experience, with deep expertise in SOC operations, incident response, & cyber threat intelligence. • Demonstrated experience leading complex investigations into APTs, cybercrime operations, & enterprise - wide security incidents. Technical Skills & Expertise Advanced Incident Response & Forensics: • Expert-level proficiency in digital forensics, memory analysis, network forensics, & endpoint telemetry analysis. • Ability to track adversary TTPs across enterprise environments using advanced threat intelligence correlation • Hands-on experience with industry - leading SIEM, EDR, IDS / IPS, forensic tools, & threat intelligence platforms. • Proficiency in YARA rule development, Sigma rules, & custom detection engineering. • Expert understanding of nation-state cyber threats, APT campaigns, & cybercriminal ecosystems. • Strong working knowledge of MITRE ATT & CK, Diamond Model, Cyber Kill Chain, & TIBER - EU methodologies. • Ability to reverse engineer malware & extract indicators of compromise ( IOCs ) & tactics of adversaries. Scripting & Security Automation: • Proficiency in Python, PowerShell, or Bash for security automation, log parsing, & threat hunting. • Experience building custom SOAR playbooks to automate incident response & threat containment. • Strong understanding of cloud security monitoring ( AWS, Azure, GCP ) & zero-trust architecture principles. • Deep knowledge of network security protocols, firewall technologies, & modern identity-based threats. Job Type: Contract Pay: $80.00 - $90.00 per hour Expected hours: 40 per week Schedule: • 8 hour shift Work Location: Hybrid remote in Greensboro, NC 27401
Job Type
Contractor role
Skills required
Python, Azure
Location
Greensboro, North Carolina
Salary
$80 - $90
Date Posted
July 10, 2025
Pioneer IT Systems is seeking a Senior Cyber Security Analyst to lead incident response and threat hunting efforts within their Global Cybersecurity Operations Center in Greensboro, NC. The role requires extensive experience in cybersecurity operations and strategic leadership to enhance the organization's defenses against emerging threats.