
Principal Security Analyst
CyderesPosted 4/29/2025

Principal Security Analyst
Cyderes
Job Location
Job Summary
Cyderes is seeking a Principal Security Analyst to deliver exceptional client experiences and strategic security solutions. As a trusted advisor, the role involves owning security outcomes for assigned customers, leading customer-facing calls, and performing advanced threat hunting and proactive investigations. The ideal candidate will have at least 5+ years of professional experience in cybersecurity, expertise in security operations, and hands-on experience with EDR tools and SIEM platforms. Strong written and verbal communication skills are required, along with the ability to create reports, dashboards, and strategic recommendations. Cyderes is an Equal Opportunity Employer (EOE) and offers flexible remote work options.
Job Description
Responsibilities:
- Own security outcomes for assigned customers, ensuring high-quality SOC deliverables and alignment with client expectations.
- Lead customer-facing calls to discuss incident investigations, provide strategic guidance, and offer recommendations for improving security posture.
- Perform advanced threat hunting and proactive investigations to detect, isolate, and mitigate malicious activities in customer environments.
- Act as a technical lead within the SOC, providing mentorship, guidance, and leadership to other Security Analysts.
- Oversee real-time monitoring and detection activities using SIEM, EDR, and other security tools, ensuring timely identification and escalation of threats.
- Collaborate with internal teams, such as Detection Engineering, to refine detection rules and enhance automation workflows to close gaps in customer security posture.
- Maintain and update security operations processes and incident response playbooks to ensure they remain current and effective.
- Provide training to Security Analysts on tools, processes, and emerging threats to enhance team capabilities.
- Lead post-incident reviews, identifying lessons learned, and sharing findings to improve operational effectiveness.
- Tailor detection and response strategies to meet the unique needs of individual customer environments.
- Stay informed of the evolving threat landscape to provide actionable insights and ensure a proactive approach to security operations.
Requirements:
- Experience: Minimum 5+ years of professional experience in cybersecurity, with a strong background in security operations.
- System Administration Knowledge/Experience: Expertise securing and investigating security incidents on Windows, Unix/Linux, and MacOS environments.
- Networking Proficiency: Advanced understanding of networking concepts, including the ability to analyze network artifacts and logs effectively.
- Endpoint Detection and Response (EDR): Hands-on experience with EDR tools such as SentinelOne,
- CrowdStrike, Microsoft Defender, or equivalent platforms.
- Security Information and Event Management (SIEM): Advanced knowledge and experience with at least one SIEM platform, such as Microsoft Sentinel, Splunk, Google Chronicle, or IBM QRadar.
- Technical Skills: Proficient in threat hunting, malware analysis, and leveraging security tools to investigate and mitigate threats.
- Communication: Strong written and verbal communication skills, with the ability to create and present reports, dashboards, and strategic recommendations.
- Certifications (Preferred): Industry-recognized certifications such as CISSP, GCIH, GCFA, OSCP, or equivalent.