R2 Cyber Security Analyst Remote The R2 Analyst plays a vital role in the Security Operations Centre (SOC), contributing to the organisation's overall cybersecurity posture by actively participating in the monitoring, analysis, and response to security incidents and events. With a focus on continuous learning and collaboration, the R2 Analyst supports the SOC team in identifying, assessing, and … the application of foundational technical skills and a strong dedication to detail-oriented analysis, the R2 Analyst assists in safeguarding the organization's critical systems, data, and assets from cyber risks. By working closely with senior analysts and leveraging emerging technologies, the R2 Analyst helps maintain a vigilant and proactive defence against evolving cyber threats, enabling the organisation … impact through investigation and work with senior analysts for resolution. Liaise with CIRT for active compromises. Initiate escalation procedure for potential threats. Ability to interpret threat priority against the cyberkill chain. Provide appropriate mitigation and remediation steps. Desirable Requirements Tooling: Hands-on experience with Security Information and Event Management (SIEM) platforms (e.g., Splunk, Sentinel, Swimlane) and their More ❯
/Requirements Desired Qualifications: Bachelor's Degree in Computer Science or "STEM" Majors (Science, Technology, Engineering and Math) CISSP, CISM or related SANs or Industry certifications Desired Expertise: - Relevant Cyber or IT related experience in client and server environments. Infrastructure management and support - Understanding of CND-based analytical models (KillChain, ATT&CK, Pyramid of Pain, etc. … Understanding of APT, Cyber Crime and other associated tactics - Understanding of host forensics and network analysis techniques and tools - Understanding of malware and reverse engineering - Understanding of vulnerabilities. Vulnerability management, remediation and implementation techniques. - Understanding of responding to threats in cloud platforms (AWS, Azure, Google, etc.) - Excellent verbal and written communication skills - Excellent organizational and analytical skills - Detail oriented More ❯
/Requirements Desired Qualifications: Bachelor's Degree in Computer Science or STEM" Majors (Science, Technology, Engineering and Math) CISSP, CISM or related SANs or Industry certifications Desired Expertise: - Relevant Cyber or IT related experience in client and server environments. Infrastructure management and support - Understanding of CND-based analytical models (KillChain, ATT&CK, Pyramid of Pain, etc. … Understanding of APT, Cyber Crime and other associated tactics - Understanding of host forensics and network analysis techniques and tools - Understanding of malware and reverse engineering - Understanding of vulnerabilities. Vulnerability management, remediation and implementation techniques. - Understanding of responding to threats in cloud platforms (AWS, Azure, Google, etc.) - Excellent verbal and written communication skills - Excellent organizational and analytical skills - Detail oriented More ❯
/Requirements Desired Qualifications: Bachelor's Degree in Computer Science or "STEM" Majors (Science, Technology, Engineering and Math) CISSP, CISM or related SANs or Industry certifications Desired Expertise Relevant Cyber or IT related experience in client and server environments. Infrastructure management and support Understanding of CND-based analytical models (KillChain, ATT&CK, Pyramid of Pain, etc. … Understanding of APT, Cyber Crime and other associated tactics Understanding of host forensics and network analysis techniques and tools Understanding of malware and reverse engineering Understanding of vulnerabilities. Vulnerability management, remediation and implementation techniques. Understanding of responding to threats in cloud platforms (AWS, Azure, Google, etc.) Excellent verbal and written communication skills Excellent organizational and analytical skills Detail oriented More ❯