sands

Principal Analyst - Cyber Security

Apply Now

At a Glance

Location
Las Vegas, United States
Employment
Full time
Posted
2026-04-08

Key Requirements

Certifications

  • CISSP

Domain Knowledge

  • Engineering
  • Media

Requirements

Minimum of two (2) years of Incident Response experience.

Experience in analyzing and responding to escalated events and alerts from Threat Hunting Efforts, various Cyber tools including but not limited to SIEM, EDR, and Phishing, Intelligence derived data, and WAF.

Demonstrated knowledge and experience in developing documentation and processes regarding analysis of multiple Cyber disciplines including Forensics, Intelligence, Security Operations Center, and Incident Response.

Understanding of the following concepts: Cyber Kill Chain, Advanced Persistent Threat, Third Party Risks, Cybercrime, Hacktivism, Various Cyber Attack Types, Fraud, Malware and Ransomware, Mobile Threats, Social Engineering, Insider Threats, SOC function, Incident management, Networks and Encryption.

Provides leadership, expert analysis to requirements gathering, and project planning for complex communications projects and other significant threat intelligence initiatives.

Independently interfaces at various levels within the organization, including executive leadership, senior stakeholders, business line leaders, and technical subject-matter experts from various Cyber disciplines.

Responsibilities

The primary responsibility of the Principal Analyst – Cyber Security is to provide expert analysis and respond to events and incidents from Cyber Operations, Intelligence and Forensics while coordinating efforts with each team.

The Principal Analyst possess a solid sense of ethics, intimate knowledge of investigations and analysis from multiple Cyber Disciplines and be capable of effectively coordinating efforts between various Cyber Operations Teams while under duress.

Receive, analyze, and remediate alerts from Cyber Security Operations Center.

Receive, analyze, and determine applicability and remediation for events from Cyber Threat Intelligence.

Will use a variety of analysis tools in incident response investigations to determine the extent and scope of compromise.

Determines and coordinates retrieval of information and data across various Cyber and IT teams and tools to provide timely and sound analysis.