Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
Today’s threatscape is relentless. So are we. At Cyderes, we specialize in building practical IAM, exposure management, and risk programs, and stopping active threats fast with MDR that works with your existing security tools — all augmented by AI and driven by seasoned operators. Our tireless global team is laser-focused on cybersecurity, arming organizations with the people, platforms, and perspectives they need to conquer whatever tomorrow throws their way.
About the Job:
The Managed Services Security Analyst II is responsible for providing security solutions to clients. The Security Analyst II will demonstrate the capacity to consistently meet and exceed client expectations representing and reinforcing the Cyderes brand through positive interaction with other teams within the company. Perform deep dive investigations into security threats, understand and implement MITRE mapping to identify customers current security posture.
Responsibilities:
- Perform initial triage and advanced analysis tasks across endpoint, SIEM, server, and network infrastructure.
- Perform proactive security investigations and searches on client environment to detect malicious activities
- Perform Incident investigations and deep dive analysis on detected threats.
- Understand and identify indicators of attack and compromise in alerts, by hunting through data, and by reviewing past investigations.
- Have full understanding of the MITRE ATT&CK framework. Mapping clients’ use cases to tactics and techniques.
- Triage, review, and provide log data for more insight and recommendations to escalate through SIEM.
- Effective oral communications and writing/drafting skills.
- Maintain up to date knowledge and understanding of the current threat landscape.
- 3 or more years of progressing/in-depth IT security experience.
- Demonstrate experience in using Endpoint Detection and Response software (SentinelOne, CrowdStrike, Defender, etc.)
- Advanced knowledge of at least one leading SIEM platform (Microsoft Sentinel, Splunk, Elastic, Google Chronicle, Sumo Logic etc.)
- Experience in SOC and Incident Response activities.
- Understanding of SIEM correlation, use cases and events.
- Should hold at least one industry certification Sec+, CEH, SC 200, Any Cloud Certification and Cloud Security Fundamentals.
- Basic scripting or development experience would be an added advantage.
Note: This job posting is intended for direct applicants only. We request that outside recruiters do not contact us regarding this position.
We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
Key Skills
Ranked by relevanceReady to apply?
Join Cyderes and take your career to the next level!
Application takes less than 5 minutes

