CrawlJobs Logo

Cyber Security Operations Analyst

anavationllc.com Logo

AnaVation

Location Icon

Location:
United States, Bethesda

Category Icon
Category:
IT - Administration

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

Responsible for progressing cybersecurity operations, maintaining proactive threat detection capabilities, and conducting vulnerability scanning and risk assessment using security tools such as Assured Compliance Assessment Solution (ACAS), Host Based Security System (HBSS), and Security Information Event Management (SIEM). Performs real-time monitoring and defense of the IT environment to ensure resilience against cyber threats and vulnerabilities. Responds to alerts from HBSS and SIEM systems by conducting analysis and taking appropriate responses. Manages IPS/IDS systems to detect and prevent unauthorized access and protect network and data integrity.

Job Responsibility:

  • Progressing cybersecurity operations
  • Maintaining proactive threat detection capabilities
  • Conducting vulnerability scanning and risk assessment using security tools such as Assured Compliance Assessment Solution (ACAS), Host Based Security System (HBSS), and Security Information Event Management (SIEM)
  • Performing real-time monitoring and defense of the IT environment
  • Responding to alerts from HBSS and SIEM systems by conducting analysis and taking appropriate responses
  • Managing IPS/IDS systems to detect and prevent unauthorized access and protect network and data integrity

Requirements:

  • Active TS/SCI Clearance with CI Polygraph
  • 6-10 years of Cyber Security/Operations support OR Bachelor’s degree in Network Engineering, Computer Science or related technical field and 2-4 years of experience
  • DoD 8140 IAT Level II Certification (CCNA-Security, CySA+, CND, Security+)
  • Documenting network schemas and cyber operation tool solutions
  • Provide security posture, vulnerability, threat and risk situational awareness
  • Halt or minimize cyber-attack and insider threat efforts or damage
  • Designing, modeling, and securing networks
  • Troubleshooting network issues and recommendation of network modifications
  • Knowledgeable on the use of different SIEM applications, its interfaces, and how to retrieve data from its database
  • Knowledgeable on log aggregation and event correlation of any SIEM
  • Knowledgeable in utilizing the system to gain insightful and actionable results

Nice to have:

  • Bachelor’s degree in Network Engineering, Computer Science or related technical field plus 2-4 years of Cyber Security/Operations support OR Master’s degree Network Engineering, Computer Science or related technical field plus 0-2 year of experience
  • CySA+ certification
  • Knowledgeable in the use of Tableau data visualization tool, to produce reports
  • Experience with driving data visualization tools and presentations
What we offer:
  • Generous cost sharing for medical insurance for the employee and dependents
  • 100% company paid dental insurance for employees and dependents
  • 100% company paid long-term and short term disability insurance
  • 100% company paid vision insurance for employees and dependents
  • 401k plan with generous match and 100% immediate vesting
  • Competitive Pay
  • Generous paid leave and holiday package
  • Tuition and training reimbursement
  • Life and AD&D Insurance

Additional Information:

Job Posted:
December 06, 2025

Employment Type:
Fulltime
Work Type:
On-site work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Cyber Security Operations Analyst

New

Security Operations Analyst

Location
Location
India , Bengaluru
Salary
Salary:
Not provided
take2games.com Logo
Take-Two Interactive Software, Inc.
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 3+ years of experience in a Security Operations Center, incident response team, or cyber defense role
  • Hands-on experience with SIEM/SOAR platforms (e.g., Splunk, XSOAR and XSIAM) and endpoint detection solutions (e.g., CrowdStrike, SentinelOne)
  • Deep understanding of cybersecurity fundamentals, threat detection techniques, and attack frameworks such as MITRE ATT&CK
  • Comfortable analyzing logs and events from various systems including network devices, endpoints, cloud environments, and identity providers
  • Familiarity with scripting or automation (e.g., Python, PowerShell) to enhance investigation and response workflows is a plus
  • Experience with workflow and ticketing tools like ServiceNow or Jira for incident documentation and coordination
  • Strong written and verbal communication skills — able to clearly document findings, articulate risk, and support incident coordination across teams
  • Bachelor’s degree in Computer Science, Cybersecurity, Information Security, or Cybersecurity Engineering are a plus
  • One or more relevant certifications such as: CompTIA: Network+, Security+, CySA+, PenTest+, Cloud+ and Cloud Security: AWS Security Specialty, Google Professional Cloud Security Engineer and Microsoft Azure Security Engineer Associate are plus
Job Responsibility
Job Responsibility
  • Perform real-time security event monitoring, triage, and analysis across multiple platforms, using SIEM and EDR tools
  • Analyze log and telemetry data from diverse sources (e.g., firewalls, endpoint protection, IDS/IPS, application logs) to detect and respond to potential threats
  • Investigate and respond to security incidents, performing root cause analysis and supporting containment, eradication, and recovery efforts across endpoints, servers, cloud, and network environments
  • Conduct proactive threat hunting using behavioral analytics, threat intelligence, and hypothesis-driven queries to detect stealthy or novel attack techniques
  • Support the SOC's daily operational cadence, including participating in shift handoffs, reviewing detection effectiveness, and maintaining situational awareness of the global threat landscape
  • Contribute to the development and refinement of incident response processes, detection rules, and SOC playbooks
  • Collaborate with threat intelligence, engineering, and infrastructure teams to develop detection use cases and improve overall SOC effectiveness
  • Help shape SOC dashboards, reports, and playbooks that enhance visibility and response across business units and geographies
What we offer
What we offer
  • Discretionary bonus
  • Provident fund contributions
  • 1+5 medical insurance + top up options and access to Practo online Doctor consultation App
  • Employee assistance program
  • 3X CTC Life Assurance
  • 3X CTC Personal accident insurance
  • childcare services
  • 20 days holiday + statutory holidays
  • Gym reimbursement up to INR1150 per month
  • wellbeing program with the chance to earn up to $93 per annum
Read More
Arrow Right
New

Principal Cyber Operations Analyst Trainer

Knight Federal Solutions Inc. is seeking a Principal Cyber Operations Analyst Tr...
Location
Location
United States , Suffolk
Salary
Salary:
Not provided
knightfederal.com Logo
Knight Federal Solutions
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree with a minimum of 10 years of professional and/or military operational experience
  • or specialized technical training and certifications directly related to the requirement
  • Master’s degree with a minimum of 6 years of professional and/or military operational experience
  • or specialized technical training and certifications directly related to the requirement
  • Joint Forces Staff College or Service equivalent
  • Thorough understanding of cyber operations and experience at the operational level
  • Must be willing to travel worldwide, to include areas considered hazardous duty (up to 25% of the time)
  • Must have an active U.S. Department of Defense (DoD) Secret security clearance with the ability to obtain a DoD Top Secret security clearance once aboard
  • Must be able to work on-site in Suffolk, Virginia
Job Responsibility
Job Responsibility
  • Acts as a subject matter expert and trainer in cyber operations in joint, multinational, interagency, and globally integrated exercises and operations
  • Integrates into, contributes to, and provides functional continuity in the DTD’s Fires and Effects Section
  • Mentors, trains, and supports new OTs
  • Participates as a member of Deployable Training Teams (DTTs)
  • Ascertains key command challenges at the operational and strategic levels of war and conducts cross-functional analysis of information gathered from joint exercises and training events for the development of lessons learned, insights, and best practices
  • Understands strategic thought and direction as it guides and is influenced by campaign, deliberate, and crisis planning at the operational level
  • Researches national strategic documents, historical exercise documents, real world operations, the operating environment, command mission, organization, plans, and orders, as well as interagency and coalition policies, strategies, and plans
  • Conducts trend analysis, understands and improves battle rhythms, provides observation and training, ties phased operational planning to strategic thought, and develops feedback
  • Develops the Commander’s Facilitated After-Action Review (FAAR), Executive Summary Report (ESR), Combined Functional Report (CFR), and Internal After Action Review (IAAR), Post-event debriefs and summaries, and input into the Joint Lessons Learned Information System (JLLIS)
  • Updates and maintains documents, articles, and periodicals
Read More
Arrow Right

Senior Cyber Security Analyst

In the Bosch Cyber Security Organization, we coordinate the vulnerability manage...
Location
Location
Poland , Warszawa
Salary
Salary:
Not provided
https://www.bosch.pl/ Logo
Robert Bosch Sp. z o.o.
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Completed university degree (Master/Diploma/PhD) in Information Security, Computer Science, Software Development, Electrical Engineering, Mathematics, or comparable field
  • Team player familiar with cooperation and delegation
  • Versatile and communicative individual who enjoys preparing and sharing information tailored to target audience
  • Strong technical background in security and several years of professional experience in multiple fields: IT Security, Cloud Security, Embedded Security, Industrial Control Systems (ICS), Industrial IoT (IIoT), Consumer IoT, Software Security and Security Research, Vulnerability Management process design and execution
  • Ideally basic knowledge in operational management of CSIRT, CERT, or Product-CERT
  • Love challenges while defining and implementing processes in new, effective, and user-oriented manner
  • Very good English written and spoken
  • German would be an important asset
Job Responsibility
Job Responsibility
  • Investigate and assess vulnerabilities within operational environment
  • Provide basis for prioritizing vulnerability remediation follow-up
  • Work closely with development and operations teams in Poland and tracking teams in India
  • Support further development of Enterprise Security Advisory Services
  • Track risks through vulnerabilities
  • Continuously identify process improvements for enhanced tool support
  • Coordinate implementation of improvements with international teams
  • Actively work as team to network with external stakeholders
What we offer
What we offer
  • Competitive salary + annual bonus
  • Hybrid work with flexible working hours
  • Referral Bonus Program
  • Copyright costs for IT employees
  • Professional support and knowledge sharing
  • Ongoing development opportunities in multinational environment
  • Broad access to professional trainings including language courses, conferences and webinars
  • Private medical care and life insurance
  • Cafeteria System with multiple benefits including MultiSport, shopping vouchers, cinema tickets
  • Prepaid Lunch Card
  • Fulltime
Read More
Arrow Right

Senior Cyber Security Analyst

In the Bosch Cyber Security Organization, we coordinate the vulnerability manage...
Location
Location
Poland , Warszawa
Salary
Salary:
Not provided
https://www.bosch.pl/ Logo
Robert Bosch Sp. z o.o.
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Completed university degree (Master/Diploma/PhD) in Information Security, Computer Science, Software Development, Electrical Engineering, Mathematics, or a comparable field of study
  • Team player who is familiar with both cooperation and delegation
  • Versatile and communicative individual who enjoys preparing and sharing information tailored to the target audience
  • Strong technical background in security and several years of professional experience in multiple of the following fields: IT Security, Cloud Security, Embedded Security, Industrial Control Systems (ICS), Industrial IoT (IIoT), Consumer IoT, Software Security and Security Research, Vulnerability Management process design and execution
  • ideally basic knowledge in the operational management of a CSIRT, CERT, or Product-CERT
  • Love challenges, while defining and implementing processes in a new, effective, and user-oriented manner
  • Very good English, written and spoken
  • German would be an important asset
Job Responsibility
Job Responsibility
  • Investigate and assess vulnerabilities within their operational environment, providing the basis for prioritizing the follow-up of vulnerability remediation
  • Work closely with development and operations teams in Poland, as well as tracking teams in India, supporting the further development of our Enterprise Security Advisory Services and the tracking of risks through vulnerabilities
  • Continuously identify process improvements for enhanced tool support and coordinate their implementation with the respective international teams
  • Actively work as a team to network with external stakeholders
What we offer
What we offer
  • Competitive salary + annual bonus
  • Hybrid work with flexible working hours
  • Referral Bonus Program
  • Copyright costs for IT employees
  • Private medical care and life insurance
  • Cafeteria System with multiple benefits (incl. MultiSport, shopping vouchers, cinema tickets, etc.)
  • Prepaid Lunch Card
  • Number of benefits for families (for instance summer camps for kids)
  • Non-working day on the 31st of December
  • Fulltime
Read More
Arrow Right

Cyber Security-Fraud Analyst

The L2 Support Fraud Detection Senior Analyst is a pivotal team member responsib...
Location
Location
India , Chennai
Salary
Salary:
Not provided
https://www.soprasteria.com Logo
Sopra Steria
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Tools: Octoflow, Mosaic
  • conduct investigations and reporting using Octoflow and Mosaic platforms
  • provide recommendations based on analytics derived from these tools
  • support secure integration of APIs and web services within fraud detection platforms
  • liaise with developers to validate and enhance security features in applications
  • analyse and correlate logs using SIEM solutions to identify and remediate suspicious activity
  • respond to real-time alerts and participate in threat hunting operations
  • integrate threat intelligence feeds into operational systems
  • regularly update detection mechanisms in response to emerging risks
  • lead and document the resolution of escalated fraud incidents
Job Responsibility
Job Responsibility
  • Conduct investigations and reporting using Octoflow and Mosaic platforms
  • provide recommendations based on analytics derived from these tools
  • support secure integration of APIs and web services within fraud detection platforms
  • liaise with developers to validate and enhance security features in applications
  • analyse and correlate logs using SIEM solutions to identify and remediate suspicious activity
  • respond to real-time alerts and participate in threat hunting operations
  • integrate threat intelligence feeds into operational systems
  • regularly update detection mechanisms in response to emerging risks
  • lead and document the resolution of escalated fraud incidents
  • collaborate with cross-functional teams for swift containment, investigation, and recovery
What we offer
What we offer
  • Inclusive and respectful work environment
  • positions open to people with disabilities.
  • Fulltime
Read More
Arrow Right

Cyber Security Soc Analyst

The SOC Analyst (L1/L2) and Lead are responsible for proactive monitoring, detec...
Location
Location
India , Chennai
Salary
Salary:
Not provided
https://www.soprasteria.com Logo
Sopra Steria
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Strong knowledge of SIEM platforms and alert investigation
  • Advanced incident response, malware analysis, and RCA expertise
  • Deep knowledge of endpoint and network security tools
  • Threat hunting and forensic investigation capabilities
  • Familiarity with vulnerability management and DLP/email security
  • Experience with threat intelligence platforms and TTP mapping
  • Strong analytical, communication, and documentation skills
  • Guide development of SOC procedures/runbooks and continuous improvement initiatives
  • Administer DLP and email security systems
  • Operate Microsoft Defender for Endpoint, conduct threat hunting via EDR telemetry and memory dumps
Job Responsibility
Job Responsibility
  • Proactive monitoring, detection, investigation, and response to security threats using industry-leading solutions
  • Guide and architect SOC workflows and systems to ensure robust organizational security
  • Threat hunting and forensic investigation
  • Administer DLP and email security systems
  • Operate Microsoft Defender for Endpoint, conduct threat hunting via EDR telemetry and memory dumps
  • Use, configure, and optimize SIEM tools (Splunk, IBM QRadar, Microsoft Sentinel, LogRhythm, ArcSight, Elastic SIEM) for threat identification and alert management
  • Guide development of SOC procedures/runbooks and continuous improvement initiatives
  • Leadership and team management
What we offer
What we offer
  • Inclusive and respectful work environment
  • Positions open to people with disabilities
  • Fulltime
Read More
Arrow Right

Advanced Cyber Defense Analyst

The Advanced Cyber Defense (ACD) team is a group inside the Citi Security Operat...
Location
Location
Hungary , Budapest
Salary
Salary:
Not provided
https://www.citi.com/ Logo
Citi
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 4-6 years working in the security & operations fields
  • Possessing strong fundamental knowledge of networks (TCP/IP) and operating systems (Windows/Linux)
  • Hands-on experience with cyber security solutions
  • SIEM, AV, NIDS, EDR etc.
  • Ability to investigate network traffic, read and interpret logs and packet captures, investigate email threats
  • Experience with cyber security incident response, web/shell programming as well as being familiar with malware and memory analysis techniques are advantageous
  • Fluency in English
  • Bachelor's Degree or higher preferred
Job Responsibility
Job Responsibility
  • Conduct research on new technology offerings and determine applicability in Citibank’s SOC
  • Evaluate and advise on the implementation and effectiveness of the cybersecurity safeguards to ensure that they provide the intended level of protection
  • Development of new tools, processes and procedures to enhance SOC monitoring and analysis capabilities
  • Perform risk assessments and threat modelling to identify gaps in SOC monitoring capabilities and devise strategies to minimize the risk
  • Conduct online research of the latest cyber threats and ensure those can be detected by existing in-house technologies
  • Identify redundant tasks and automate them to increase efficiency of the SOC team
  • Utilize SOAR to develop playbooks for automating complex use cases
What we offer
What we offer
  • Cafeteria Program
  • Home Office Allowance (for colleagues working in hybrid work models)
  • Paid Parental Leave Program (maternity and paternity leave)
  • Private Medical Care Program and onsite medical rooms at our offices
  • Pension Plan Contribution to voluntary pension fund
  • Group Life Insurance
  • Employee Assistance Program
  • Access to a wide variety of learning and development programs, online course libraries and upskilling platforms, such as Udemy and Degreed
  • Flexible work arrangements to support you in managing work - life balance
  • Career progression opportunities across geographies and business lines
  • Fulltime
Read More
Arrow Right

Cyber Threat Analyst

AnaVation is seeking a Cyber Threat Analyst to join our team and support our mis...
Location
Location
United States , Reston
Salary
Salary:
Not provided
anavationllc.com Logo
AnaVation
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Active TS/SCI Clearance
  • Bachelor’s degree in relevant field and 1-8 years of experience related to specific functional area (May substitute Master’s degree in lieu of 4 years of experience)
  • CompTIA Security+ or equivalent IAT Level II and currently hold or able to obtain CSSP Analyst certification (such as CEH, CySA+, CFR)
  • Working collaboratively across cross-functional teams of all experience levels
  • Experience working collaboratively with staff at all experience levels to deliver short-term, medium-term, and long-term commitments
  • Experience completing and coordinate tasks across cross-functional teams in either a lead or supporting role
  • Ability to provide recommendations for enhancing views of device data in bulk and to view associations of all the data related to those devices
  • Experience leading, developing, and delivering inter-discipline and inter-organizational capabilities and processes to improve performance
  • Technical understanding of classified networks, servers, storage, operating systems, applications, and the full stack of supporting technologies
  • Experience working with reporting, automation, and visualization systems to provide situational awareness and making recommendations to improve cyber threat intelligence and fusion capabilities
Job Responsibility
Job Responsibility
  • Create analysis products based on cyber threat fusion to clearly document significant cyber-attacks or the discovery of new vulnerabilities
  • Focus on collectively building higher value fusion products, expanding effective lines of communication, knowing lanes of responsibility, and building trust in consistently improving capabilities
  • Conduct research and evaluate technical and all-source intelligence with specific emphasis on network operations and cyber warfare tactics, techniques, and procedures focused on the threat to networked weapons platforms and US and DoD information networks
  • Analyze network events to determine the impact on current operations and conduct all-source research to determine advisory capability and intent
  • Develops technical solutions to complex problems
  • Exercises considerable latitude in determining objectives and approaches to assignment
What we offer
What we offer
  • Generous cost sharing for medical insurance for the employee and dependents
  • 100% company paid dental insurance for employees and dependents
  • 100% company paid long-term and short term disability insurance
  • 100% company paid vision insurance for employees and dependents
  • 401k plan with generous match and 100% immediate vesting
  • Competitive Pay
  • Generous paid leave and holiday package
  • Tuition and training reimbursement
  • Life and AD&D Insurance
Read More
Arrow Right
Welcome to CrawlJobs.com
Your Global Job Discovery Platform
At CrawlJobs.com, we simplify finding your next career opportunity by bringing job listings directly to you from all corners of the web. Using cutting-edge AI and web-crawling technologies, we gather and curate job offers from various sources across the globe, ensuring you have access to the most up-to-date job listings in one place.