
Cyber Data Jr. Analyst & Reporting Specialist at Core Specialty. Location Information: PA Remote, United States. . -. The Cyber Data Analyst & Reporting Specialist will support our cybersecurity operations through advanced data analysis, visualization, and incident support. This role will leverage Microsoft Power BI, Microsoft Sentinel Log Analytics, and a range of cybersecurity solutions to deliver actionable insights, track threat trends, and provide investigative support to cyber and IT security teams.. Key Accountabilities/Deliverables:. Design, develop, and maintain interactive dashboards and reports using Microsoft Power BI to visualize cyber threat trends, incidents, and KPIs for executive and operational audiences.. Query and analyze log data in Microsoft Sentinel Log Analytics (KQL) to detect anomalies, trends, and potential threats across cloud and on-premises environments.. Integrate data from various cybersecurity platforms (e.g., Microsoft Defender, Proofpoint, Zscaler, Palo Alto, Qualys) to support real-time and historical analysis.. Collaborate with Cyber Threat Intelligence, SOC, and Compliance teams to translate detection requirements into analytical use cases and data reports.. Participate in cybersecurity incident investigations by providing forensic log analysis, timeline reconstruction, and reporting on indicators of compromise (IOCs).. Automate data pipelines and maintain data quality checks to ensure reliable reporting across cybersecurity solutions.. Track and report on compliance metrics related to cybersecurity policies, regulatory requirements, and SLAs.. Support continuous improvement of security operations through trend analysis and feedback into detection and prevention strategies.. Assist in ad hoc security data analysis and executive report preparation for audits, risk assessments, or board presentations.. Technical Knowledge and Understanding:. Proficient in Microsoft Power BI (DAX, Power Query) and Kusto Query Language (KQL) for Sentinel.. Familiarity with . SIEM. platforms, cloud security tools, and enterprise cybersecurity technologies (Microsoft Defender, Sentinel, Qualys, Zscaler, etc.).. Understanding of cybersecurity frameworks such as NIST, MITRE ATT&CK, or ISO 27001.. Experience:. Bachelor’s degree in Cybersecurity, Computer Science, Information Systems, or a related field. Equivalent work experience accepted.. 3+ years of experience in cybersecurity data analysis, threat monitoring, or SOC operations.. Experience with scripting languages (Python, PowerShell) is a plus.. Strong communication skills, including the ability to present complex data to non-technical stakeholders.. Experience with investigations, incident triage, and forensic analysis is desirable.. The expected pay range for the role is $000 - $000. The specific offer will depend on an applicant’s skills and experiences. The disclosed pay range estimate may also be adjusted for the applicable geographic differential for the location in which the position is filled.. Applicants must be authorized to work for any employer in the U.S. We are unable to sponsor or take over sponsorship of an employment Visa for this position.. #LI-Hybrid. #LI-Remote. #LI-Onsite. -. At Core Specialty, you will receive a competitive . salary. and opportunities for professional development and advancement. We offer medical, dental, vision, and life insurances; short and long-term disability; a Company-match of 100% of a 6% contribution 401(k) plan; an Employee Assistance Plan; Health Savings Account, Flexible Spending Account, Health Reimbursement Account, and a wellness program. .