← Back to Job Listings
Cyderes logo

Principal Security Analyst - SecOps (Chronicle)

Cyderes
Full Time1d

Job Location

Job Summary

Cyderes is a global cybersecurity services provider seeking a Principal Security Analyst to deliver security solutions and exceptional client experiences. As a trusted advisor, the role involves strategic advisory, advanced analysis, and custom security content for managed service customers. The Principal Security Analyst will own security outcomes, lead customer-facing calls, perform threat hunting, and collaborate with internal teams to refine detection rules and enhance automation workflows. With a strong background in cybersecurity operations, the ideal candidate will have expertise in SIEM, EDR, and endpoint detection, as well as excellent communication skills. This is a full-time, remote position with a competitive salary and benefits package.

Cyderes (Cyber Defense and Response) is a pure-play, full life-cycle cybersecurity services provider with award-winning managed security services, identity and access management, and professional services designed to manage the cybersecurity risks of enterprise clients.  We specialize in multi-technology, complex environments with the in speed and agility needed to tackle the most advanced cyber threats. We leverage our global scale and decades of experience to accelerate our clients’ cyber outcomes through a full lifecycle of cybersecurity services. We are a global company with operating centers in the United States, Canada, the United Kingdom, and India.

About the Role:
The Managed Services Principal Security Analyst Is a Customer-Facing Role Focused on Delivering Security Solutions and Exceptional Client Experiences. As A Trusted Advisor, The Principal Security Analyst Is Responsible for Strategic Advisory, Advanced Analysis, And Custom Security Content for Cyderes’ Managed Service Customers. This Role Requires Consistent Representation of The Cyderes Brand Through Effective Collaboration and Positive Engagement with Internal Teams and Clients.

Responsibilities:

    • Own security outcomes for assigned customers, ensuring high-quality SOC deliverables and alignment with client expectations.
    • Lead customer-facing calls to discuss incident investigations, provide strategic guidance, and offer recommendations for improving security posture.
    • Perform advanced threat hunting and proactive investigations to detect, isolate, and mitigate malicious activities in customer environments.
    • Act as a technical lead within the SOC, providing mentorship, guidance, and leadership to other Security Analysts.
    • Oversee real-time monitoring and detection activities using SIEM, EDR, and other security tools, ensuring timely identification and escalation of threats.
    • Collaborate with internal teams, such as Detection Engineering, to refine detection rules and enhance automation workflows to close gaps in customer security posture.
    • Maintain and update security operations processes and incident response playbooks to ensure they remain current and effective.
    • Provide training to Security Analysts on tools, processes, and emerging threats to enhance team capabilities.
    • Lead post-incident reviews, identifying lessons learned, and sharing findings to improve operational effectiveness.
    • Tailor detection and response strategies to meet the unique needs of individual customer environments.
    • Stay informed of the evolving threat landscape to provide actionable insights and ensure a proactive approach to security operations.

Requirements:

    • Experience: Minimum 5+ years of professional experience in cybersecurity, with a strong background in security operations.
    • System Administration Knowledge/Experience: Expertise securing and investigating security incidents on Windows, Unix/Linux, and MacOS environments.
    • Networking Proficiency: Advanced understanding of networking concepts, including the ability to analyze network artifacts and logs effectively.
    • Endpoint Detection and Response (EDR): Hands-on experience with EDR tools such as SentinelOne,
    • CrowdStrike, Microsoft Defender, or equivalent platforms.
    • Security Information and Event Management (SIEM): Advanced knowledge and experience with at least one SIEM platform, such as Microsoft Sentinel, Splunk, Google Chronicle, or IBM QRadar.
    • Technical Skills: Proficient in threat hunting, malware analysis, and leveraging security tools to investigate and mitigate threats.
    • Communication: Strong written and verbal communication skills, with the ability to create and present reports, dashboards, and strategic recommendations.
    • Certifications (Preferred): Industry-recognized certifications such as CISSP, GCIH, GCFA, OSCP, or equivalent.
Cyderes is an Equal Opportunity Employer (EOE). Qualified applicants are considered for employment without regard to race, religion, color, sex, age, disability, sexual orientation, genetic information, national origin, or veteran status.

Note: This job posting is intended for direct applicants only. We request that outside recruiters do not contact us regarding this position.