StaffAttract
  • Login
  • Create Account
  • Products
    • Private Ad Placement
    • Reports Management
    • Publisher Monetization
    • Search Jobs
  • About Us
  • Contact Us
  • Unsubscribe

Login

Forgot Password?

Create Account

Job title, industry, keywords, etc.
City, State or Postcode

Network Security Analyst 3

Lorven Technologies - Austin, TX

Apply Now

Job Description

Hi Role: Network Security Analyst 3 Location: OAG State Office located at 5500 E. Oltorf St, Austin, TX 78741 Teleworking is currently allowed for this contract position with management approval. Contract job Job description: Key Responsibilities Proactively conduct threat hunting activities to identify malicious activity, advanced persistent threats, and indicators of compromise not detected by automated tools Develop and execute hypothesis-driven hunts based on threat intelligence, adversary tactics, techniques, and procedures (TTPs), and organizational risk profiles Analyze endpoint, network, identity, and cloud telemetry to detect anomalous or suspicious behavior Investigate and validate potential security incidents, determine root cause, and assess scope and impact Collaborate with incident response, SOC, and detection engineering teams to support containment, eradication, and recovery activities Translate threat hunting findings into actionable detection logic, alerts, and analytics to improve security monitoring Document hunting methodologies, findings, and recommendations in formal reports and knowledge repositories Contribute to the development and tuning of security use cases, queries, and detection rules across SIEM, EDR, NDR, and cloud security platforms Leverage threat intelligence sources to track emerging threats, attacker tools, and campaigns relevant to the organization Support purple team activities, tabletop exercises, and continuous adversary simulation efforts Maintain awareness of evolving attacker techniques and emerging cybersecurity threats The above job description and requirements are general in nature and may be subject to change based on the specific needs and requirements of the organization and project. II. CANDIDATE SKILLS AND QUALIFICATIONS Minimum Requirements: Candidates that do not meet or exceed the minimum stated requirements (skills/experience) will be displayed to customers but may not be chosen for this opportunity. Years Required/Preferred Experience 8 Required Strong understanding of attacker tactics, techniques, and procedures. 8 Required Experience analyzing logs and telemetry from SIEM, EDR/XDR, network security, identity platforms, and cloud environments. 8 Required Proficiency in query languages and scripting used for threat hunting. 8 Required Solid knowledge of Windows, Linux, and cloud operating systems, including common attack vectors and persistence mechanisms. 8 Required Proven expertise in security considerations of cloud computing: They include data breaches, broken authentication, hacking, account hijacking, malicious insiders, third parties, APTs, data loss and DoS attacks. 8 Required Knowledge and understanding of threat analysis and assessment of potential and current information security risk/threats and designing solutions to mitigate those threats. 8 Required Knowledge and experience working with relevant National Institute of Standards and Technology (NIST) standards. 8 Required Familiarity with threat intelligence sources, malware analysis concepts, and digital forensics fundamentals. 8 Required Experience documenting investigations, creating hunt reports, and communicating technical findings to diverse audiences. 8 Required Strong analytical, problem-solving, and critical-thinking skills. 8 Required Ability to work independently while collaborating effectively within cross-functional cybersecurity teams. 8 Required Ability to resolve complex security issues in diverse and decentralized environments; to learn, communicate, and teach new information and security technologies; and to communicate effectively. 8 Required Conduct forensic investigations on cyberattacks to determine how they occurred and how they can be prevented in the future. 8 Required Experience creating/reviewing/updating security policies and standards for the public/private/hybrid cloud contexts. 3 Preferred GSEC, CEH, CISA, CCSP 3 Preferred Certification as an AWS Solutions Architect, Cloud Security Certification, and/or OpenStack Administrator Certification a plus. (Other cloud-related certification also a plus.) 3 Preferred Experience with Endpoint Detection and Response (i.e. EndGame, Crowdstrike, CyberReason). Detect and respond to alerts from end point detection response tools. 3 Preferred Experience with Email Threat Management (i.e. Proofpoint, MimeCast, Microsoft). 3 Preferred Experience with SIEM engineering design/management/analysts (i.e. Splunk, Rapid7, SumoLogic). 3 Preferred Experience with Data Loss Protection/Cloud Access Security Brokers (i.e. Symantec, Microsoft, Bitglass, Netskope). 3 Preferred Experience with Cloud Enterprise Network Security (i.e. Cisco Umbrella, Palo Alto, ZScaler).

Created: 2026-03-04

➤
Footer Logo
Privacy Policy | Terms & Conditions | Contact Us | About Us
Designed, Developed and Maintained by: NextGen TechEdge Solutions Pvt. Ltd.