
Cybersecurity Event Analyst (Remote - US) at Jobgether. This position is posted by Jobgether on behalf of a partner company. We are currently looking for a . Cybersecurity Event Analyst. in the . United States. .. In this role, you will be a key member of a Cyber Investigations & Response Team (CIRT), responsible for monitoring, detecting, and responding to cybersecurity events in a 24x7 global environment. You will leverage advanced security technologies, threat intelligence, and data analysis to identify potential threats and incidents across enterprise networks. The role combines technical expertise with investigative skills, requiring collaboration with cross-functional teams to drive security improvements and maintain operational excellence. You will act as an escalation point for analysts, mentor SOC staff, and continuously develop new detection capabilities. This position emphasizes proactive threat hunting, incident response, and process optimization, enabling measurable improvements in security posture while contributing to a resilient, secure organization.. . Accountabilities:. Monitor, detect, triage, and respond to security events and potential incidents across enterprise networks.. Serve as an escalation point for L1 and L2 SOC analysts, providing guidance and mentorship.. Collaborate with threat hunters, incident responders, forensic investigators, and other cybersecurity teams.. Analyze threat actor tactics, techniques, and procedures (TTPs) and document findings using frameworks such as MITRE ATT&CK and Cyber Kill Chain.. Utilize automation and orchestration tools to streamline repetitive tasks and improve response efficiency.. Tune security systems, including SIEM, EDR, IDS/IPS, and other monitoring tools, to maximize detection and minimize false positives.. Assist in incident response activities, including triage, remediation, documentation, and post-incident reviews.. . 7+ years of experience in cybersecurity, including threat hunting, IT security, incident response, or network security.. Experience working in a Security Operations Center (SOC), incident response, or threat hunting team.. Familiarity with 24x7 operational environments, preferably with geographically dispersed teams.. Hands-on experience with SIEM systems, endpoint detection and response, threat intelligence platforms, automation/orchestration tools, IDS/IPS, and DLP solutions.. Strong analytical, investigative, and problem-solving skills.. Excellent written and verbal communication skills for collaborating with technical teams, management, auditors, and external consultants.. High level of integrity, confidentiality, and sound judgment.. Preferred: Cybersecurity certifications such as Security+, CySA+, CASP+, Pentest+, CEH, GSEC, GCIH, GCIA, or CISSP.. Knowledge of compliance frameworks and regulations such as HIPAA, HITRUST, SOX, or GDPR.. Experience with network systems, firewall technologies, proxy solutions, antivirus, and scripting languages (Python, JavaScript, Perl).. . Company Location: United States.