Security Analyst, Managed Detection & Response

Remote (US)


At-Bay is a cyber insurance provider designed from the ground up to help businesses meet digital risk head-on.

View company page

Security Analysts provide first-line security monitoring services to At-Bay’s Managed Detection & Response customers with specific responsibilities including: 

  • Operation and tuning of security monitoring tools including Endpoint Detection & Response (EDR), network monitoring, email security, Data Loss Prevention (DLP), Security Information and Event Management (SIEM), security automation tools, and others as needed 
  • Identification and analysis of anomalous activity in customer technology environments
  • Triage of event data to identity potential indicators of compromise 
  • Escalation of potentially malicious activity to engage incident responders where necessary 
  • Participation in incident investigation, containment, remediation, and recovery activities where necessary 
  • Developing and maintaining customer relationships to facilitate delivery of MDR services 
  • Developing and delivering reports on identified activity to customer stakeholders as needed 


Key skills 

  • Previous EDR, MDR, XDR, security monitoring, or incident response experience 
  • Strong oral and written communications skills 
  • Previous hands-on experience performing security operations including several of the following: 
    • Security monitoring using a variety of endpoint and network tools 
    • Deployment, tuning, and operation of security tools from vendors such as CrowdStrike, SentinelOne, and others 
    • Deployment, tuning, and operation of SIEM or other tools used to aggregate and analyze security-relevant data 
    • Triage and analysis of potential indicators of compromise 
    • Performing rapid response to contain and/or remediate potentially malicious activity 
    • Development and analysis of cyber threat intelligence 
    • Participation in investigations involving digital evidence 
    • Intrusion detection / cyber threat hunting 
    • Malware analysis 
  • Previous hands-on experience working in information technology operations (e.g., Network Operations Center, Security Operations Center, Incident Response Team, etc.) 


Minimum requirements 

  • Bachelor’s degree or equivalent 
  • Minimum of 2 years of experience in cybersecurity operations, incident response, or another security discipline 
  • Willingness to travel as needed to perform job functions 


Preferred requirements 

  • Significant undergraduate or graduate coursework in computer science, computer engineering, information systems, or cybersecurity 
  • Preferred candidates will have a mix of cybersecurity experience including either security operations or security engineering / architecture 
  • Knowledge of cloud environments including knowledge of cloud security products and services offered by major cloud service providers (e.g., AWS, Azure, Google) 
  • One or more industry cybersecurity certifications (e.g., GCIH, Security+, CISSP, etc.) 


Work location 

  • USA, nationwide 
Apply now Apply later
  • Share this job via
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: Automation AWS Azure CISSP Cloud Computer Science CrowdStrike EDR GCIH Incident response Intrusion detection Malware Monitoring SIEM SOC Threat intelligence XDR

Region: Remote/Anywhere
Job stats:  45  15  1
Category: Analyst Jobs

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.