
Job description
At TechBiz Global, we are providing recruitment service to our TOP clients from our portfolio.
We are currently looking for a highly proactive and detail-oriented Cyber Analyst to join one of our clients' teams. If you're looking for an exciting opportunity to grow in a innovative environment, this could be the perfect fit for you.
Job Responsibilities
Monitor and manage EDR (Endpoint Detection and Response) and XDR (Extended Detection and Response) platforms to identify, analyze, and respond to security threats in real time.
Perform continuous security monitoring within the Security Operations Center (SOC) environment, handling a high volume of alerts from endpoints, networks, and cloud infrastructures.
Analyze security logs, alerts, and telemetry data to detect suspicious activity, malware, and potential breaches.
Investigate, triage, and respond to security incidents, following established incident response procedures and escalation paths.
Conduct threat analysis and root cause investigations to determine impact, scope, and remediation actions.
Collaborate with SOC team members and other IT/security teams to contain, remediate, and prevent recurring incidents.
Maintain accurate incident documentation and ensure proper case management within ticketing systems.
Produce daily and weekly security reports, summarizing alerts, incidents, trends, and response actions for management and stakeholders.
Continuously tune and optimize detection rules, alerts, and workflows to reduce false positives and improve detection efficiency.
Stay informed on emerging threats, attack techniques, and industry best practices to enhance overall security posture.
Job requirements
Proficiency in EDR/XDR platforms for continuous endpoint surveillance, behavioral analysis, and event correlation via SIEM tools.
Expertise in threat hunting, alert triage, false positive qualification, and initial remediation like endpoint isolation or domain blocking.
Knowledge of network protocols, logs (Syslog, Windows Events), scripting (PowerShell), and Cyber Threat Intelligence (CTI) for threat contextualization
Bachelor's or Master's degree (Bac+3 equivalent) in cybersecurity, IT, or related fields, plus certifications, vendor-specific ESET, Trellix, Barracuda, SentinelOne, Fortigate.
2-5 years in SOC Tier 1/2 roles, with hands-on experience triaging alerts on EDR/XDR consoles to minimize noise.
Ongoing training in advanced threats (EDR, XDR, MDR) to progress to senior positions.
or
All done!
Your application has been successfully submitted!
