Role Description
:
The DETECT Analyst plays a critical role in strengthening network defense capabilities by developing, testing, and implementing advanced detection measures across multiple data sources. This position involves researching emerging threats, building detection analytics, and conducting forensic analysis and threat hunting to identify and mitigate malicious activity.
The ideal candidate is a technically skilled and analytical professional with a deep understanding of enterprise environments and a passion for continuous improvement in cybersecurity operations.
Key Responsibilities:
Qualifications:
1. Use network and host-based data to drive detection, monitoring, and response capabilities.
2. Create detection analytics based on the MITRE ATT&CK Framework and other security frameworks.
3. Perform research on adversarial Tools, Techniques, and Procedures (TTPs).
4. Assist incident response (IR) teams by analyzing host behavior and network traffic.
5. Collaborate with technical teams to develop and improve detection and response capabilities.
6. Conduct forensic analysis and proactive threat hunting as required.
7. Work independently and collaboratively while maintaining attention to detail under pressure.
Clearance Level: TS/SCI
Certifications: IAT III and CND cert
Experience:
8. Minimum 3–5 years of experience performing incident response, forensics, malware analysis, or penetration testing.
9. 5–7 years of experience required if no degree is held.
10. Strong written and verbal communication skills.
11. Strong understanding of common enterprise technologies.
12. Ability to convey highly technical concepts to audiences with varying technical understanding.
Preferred:
13. Proficient in at least three of the following disciplines: Network traffic analysis and host-based log analysis Comprehensive understanding of enterprise Windows security (Active Directory) Static and Dynamic malware analysis Disk and Memory forensics
14. Practical knowledge in at least one scripting or development language (e.g., PowerShell or Python)
15. Working familiarity with at least two of the following products: Splunk and/or Elastic Sentinel / Microsoft MDE Fidelis Network