πUnited States
Mdr Analyst

Blackpoint Cyber
πRemote - United States
Please let Blackpoint Cyber know you found this job on JobsCollider. Thanks! π
Summary
Join Blackpoint Cyber, a leading cybersecurity firm, as an intern and gain valuable experience in threat hunting, detection, and remediation. This internship offers hands-on experience in a 24/7 Security Operations Center (SOC) environment. You will analyze network and system events, collaborate with analysts, develop incident reports, and contribute to process improvements. The role requires experience in information security, SOC operations, and endpoint event triaging. Successful candidates will possess strong analytical, problem-solving, and communication skills. Blackpoint Cyber offers competitive benefits for eligible US employees.
Requirements
- Three (3+) years of experience in an information security role. Progressive relevant training and/or certification may be substituted for one (1) year of the experience requirement
- Experience working in a Security Operations Center (SOC)
- One (1+) years of experience with triaging endpoint events from EDR, NGAV, and supporting the Incident Response (IR) process
- Deep knowledge on assessing threat indicators in a Windows Environment (e.g. Malware/Malicious Anomalies/Abnormal network Activity/Root Level Compromise, Forensic Artifacts, etc.)
- Robust understanding of at least two of the following: Windows, Linux or OSX
- Familiarity with ELK stack (Dashboards, Logstash Config, Searching) Scripting / Programming with Powershell, Python, and Go
- Familiarity with AWS services such as EC2, S3 and IAM and Azure/M365
- Experience in developing, refining, and performing leadless threat hunting analysis to uncover new or potential incidents and report on results
- Excellent problem solving, critical thinking, and analytical skills with the ability to deconstruct issues (hunting anomalous pattern detection)
- Excellent written and verbal communication skills to effectively summarize and present technical findings to both technical and non-technical audiences
Responsibilities
- Analyze and evaluate anomalous network and system events in a 24x7x365 Security Operation Center (SOC) environment via conducting lead-less threat hunting
- Collaborate with MDR Analysts to research and investigate emerging cyber security threats; become an escalation point of contact for advanced intrusion analysis
- Develop Incident analysis reports and work across business units and customers to bring issues to a close
- Help design and build operational processes and procedures to improve overall SOC efficiency
- Provide actionable threat and vulnerability analysis based on security events for many independent customer environments
- Build test lab environments to research emerging techniques and make contributions to the internal and external knowledge development of threat operations
- Review sandbox technologies for additional IOCs uncovered from artifacts uncovered during analysis
Preferred Qualifications
- Bachelorβs Degree in Computer Science or related technical discipline
- Network/System Administration and/or Engineering
- Deep forensic knowledge of Windows, Mac OS and/or Linux
- Experience in Digital Forensics and Incident Response a plus
- Malware Analysis (Behavioral and/or Static analysis- IDA, Cuckoo Sandbox, x86/x64 Debugging)
- Pentesting/Red/Blue Team
- Capture The Flag (CTF) Development
Benefits
- Competitive Health, Vision, Dental, and Life Insurance plans
- A robust 401k plan
- Discretionary Time Off
- Other minor perks
Share this job:
Disclaimer: Please check that the job is real before you apply. Applying might take you to another website that we don't own. Please be aware that any actions taken during the application process are solely your responsibility, and we bear no responsibility for any outcomes.
Similar Remote Jobs
πUnited States

πAustralia
π°$138k-$201k
πWorldwide
π°$138k-$188k
πWorldwide
π°$107k-$174k
πUnited States
πAustralia
πJapan

π°$150k-$200k
πUnited States