Summary
Join SonicWall's growing security operations team as a Senior Threat Analyst. This critical role involves proactively identifying, analyzing, and mitigating security threats, providing expert guidance to internal and external partners. You will investigate complex security incidents, develop security procedures, and mentor junior analysts. The position requires extensive experience in cybersecurity, threat intelligence, and incident response, along with strong technical skills and communication abilities. You will collaborate with SOC teams, conduct threat hunting, and provide security consulting to clients. The ideal candidate will possess relevant certifications and a background in malware analysis.
Requirements
- 5+ years of experience in cybersecurity, preferably in threat intelligence, threat hunting, or incident response
- Strong experience in SOC or MDR environments with a focus on threat investigations and incident handling
- Expertise in cyber threat intelligence (CTI), malware analysis, and adversary tracking
- Strong understanding of MITRE ATT&CK, cyber kill chain, and modern attack techniques
- Hands-on experience with SIEM, EDR, and XDR platforms
- Proficiency in log analysis, packet analysis, and forensic investigations
- Familiarity with scripting and automation (Python, PowerShell, or equivalent)
- Proven experience in professional documentation and reporting, including Root Cause Analysis (RCA) and incident timelines
- Excellent written and verbal communication skills, with the ability to translate technical details into executive-level insights
Responsibilities
- Work with partners to maintain an understanding of security threats, vulnerabilities, and exploits that could impact systems, networks, and assets
- Conduct threat hunting and advanced incident investigations to detect and mitigate cyber threats
- Actively research current threats, attack vectors, and tactics being exploited in the wild
- Actively work with analysts and perform investigations on escalations
- Provide ongoing recommendations to peers and partners on security tuning and best practices
- Ability to discuss security posture with multiple clients and make recommendations to improve their holistic security approach
- Conduct gap analysis for clients to better their security posture
- Perform knowledge transfers, documentation, and training for partners regarding threat mitigation strategies
- Assist in maintaining and developing Standard Operating Procedures (SOP) for the analyst team
- Develop and maintain incident response playbooks to standardize and improve security workflows
- Work with internal teams to increase efficiency and effectiveness of security analysis provided by the threat analysis team
- Provide quality assurance (QA) reviews of security alerts handled by team members
- Train new analysts on security tools, methodologies, and investigative techniques
- Investigate high-severity and complex threats, ensuring timely and effective response
- Escalate critical security alerts to the VP of Threat Operations when required
- Document and report on security incidents, including Root Cause Analysis (RCA) and event timelines
- Provide executive briefings and reports on emerging threat trends and security incidents
Preferred Qualifications
- Certifications such as GCIA, GCTI, GREM, CISSP, OSCP, or similar
- Background in reverse engineering malware and TTP analysis
- Experience working in a Security Operations Center (SOC), Managed Security Service Provider (MSSP), or enterprise network environment as a point of escalation
Benefits
#LI-Remote
Disclaimer: Please check that the job is real before you apply. Applying might take you to another website that we don't own. Please be aware that any actions taken during the application process are solely your responsibility, and we bear no responsibility for any outcomes.