
Cybersecurity Event Analyst (Remote - US) at Jobgether. This position is posted by Jobgether on behalf of a partner company. We are currently looking for a . Cybersecurity Event Analyst. in the . United States. .. In this role, you will be a key member of a global Cyber Investigations & Response Team (CIRT), monitoring, detecting, triaging, and responding to cybersecurity events and incidents in a 24/7 operational environment. You will analyze complex data, leverage threat intelligence, and utilize advanced security technologies to protect enterprise networks. The role involves mentoring SOC analysts, collaborating with cross-functional teams, and continuously improving monitoring, detection, and response capabilities. You will have the opportunity to influence security processes, enhance organizational defenses, and directly contribute to safeguarding critical assets. This position combines technical expertise, analytical skills, and strategic problem-solving in a fast-paced, dynamic environment.. . Accountabilities:. Monitor, detect, triage, and respond to cybersecurity events and incidents across enterprise networks.. Mentor and develop SOC L1/L2 analysts, ensuring adherence to processes, and drive improvements in detection and response.. Serve as an escalation point for SOC analysts and collaborate with threat hunters, incident responders, and forensic investigators.. Analyze security threats, tactics, techniques, and procedures (TTPs) using frameworks such as MITRE ATT&CK and Cyber Kill Chain.. Utilize automation and orchestration tools to optimize workflow and reduce repetitive tasks.. Assist with incident response, including triage, remediation, and documentation.. Tune cyber defense tools to enhance detection and prevention while minimizing false positives.. Investigate and document security events, providing actionable insights to the SOC team and leadership.. . Bachelor’s degree in Computer Science, Information Security, Information Technology, or related technical field, or equivalent practical experience.. 7+ years of experience in cybersecurity, including Threat Hunting, Incident Response, IT Security, or network security.. Experience working in a 24x7 operational environment with geographically distributed teams preferred.. Proficiency with SIEM systems, EDR solutions, threat intelligence platforms, IDS/IPS, DLP, and other security monitoring tools.. Strong analytical, investigative, and problem-solving skills.. Excellent communication skills for interaction with IT professionals, senior management, and auditors.. High level of integrity, confidentiality, judgment, and professionalism.. Preferred: Cybersecurity certifications such as Security+, CySA+, CASP+, Pentest+, CEH, GSEC, GCIH, GCIA, CISSP.. Familiarity with security principles, network systems, regulatory standards (HIPAA, HITRUST, SOX, GDPR), and scripting languages (Python, JavaScript, Perl) is a plus.. . Company Location: United States.