Fevrok logo
CYBERSECURITY STAFF ANALYST - Aaron
3 years ago

JobTitle: CYBERSECURITY STAFF ANALYST - Aaron
Job ID: 414486_en-us
Salary Range: null- null
Job Category: Technology
Employment type: Full Time

Position Description:
Position Purpose:
Protecting what matters most to our associates and consumers by securing our sensitive data and critical assets from current and emerging threats. At The Home Depot Cybersecurity consists of Architecture, Governance, Identity & Access Management, Internal Threat Operations, Issue and Compliance Management, Risk Assessment/Advisory, Security Consulting, Security Operations and Strategic Planning.

Job Description: 
The Cybersecurity Staff Analyst is a senior-level position within the SOC TDR (Threat Detection & Response) team. This analyst will report to the TDR Manager and will perform tasks including advanced security monitoring through research, classification, and analysis of security events. The TDR Staff Analyst will leverage security solutions to investigate alerts and anomalous behavior. The TDR Staff Analysts will serve as an escalation point for the TDR teams, lead the review and processing of alerts from various sources, and provide expert-level analysis and detection capabilities.  
Staff Analysts perform data gathering, analysis, synthesis and develop solutions to support THD Cybersecurity practices. Staff Analyst mentors and guides Jr Analysts. Lead multiple projects, possess excellent communication skills, work well with a team, interact with multiple levels and functions across the organization. 

Major Tasks, Responsibilities & Key Accountabilities:
100% Deliver Execution, Plans & Aligns, Develop Others - Oversee multiple projects simultaneously; Strategic partner to align solutions to customers expectations Communicate to various levels of business partners; Collaborate with stakeholders, business partners, colleagues, developers and others to deliver high quality solutions; Partner cross-functionally to define assess, communicate, implement, train and change management of projects; Lead, mentor and provide guidance to team members and partners; Serve as SME and perform research/analysis within assigned projects


Responsibilities 

  • Be the front-line responder by identifying, triaging, and remediating security detections and anomalies 

  • Provide incident response support, leadingThreat Detection and Response analysts during technical investigations, effectively communicating results, analyticalanalysis, and mitigations to different operational teams and management 

  • Lead projects to ensure projects align with and meet the strategic roadmap for Threat Detection and Response 

  • Analyze and interpret complex and high-volume data from various sources to advance investigations, quantify trends, or support analytical findings 

  • Leverage technology (commercial and open source) to enrich, triage, and characterize internal insights on malware and Indicators of Compromise (IOCs) 

  • Lead the development of new investigative techniquesand automationworkflows. Regularly reviewing playbooks for efficiency and proactively improving playbooks where necessary 

  • Stay informed about information security trends and technologies in the technology industry and identify best practices and/or methodologies 

  • Work with and train junior analysts on THD technologies, alert lifecycle, and investigative best practices  

Experience (Essential) 

  • BS/MS degree in Computer Science, Cybersecurity, or 5+ years relevant cybersecurity experience 

  • Ability to lead other analysts in day-to-day SOC operations 

  • Effectively create and deliver meaningful briefs (metrics) to various teams and management 

  • Strong understanding in at least one of the following disciplines: network analysis; intrusion analysis; malware analysis; understanding of red team tactics 

  • Experience with SIEM, EDR solutions, and analyzing network and endpoint logs 

  • Knowledge of cloud infrastructure and cloud security. 

  • Knowledge in evaluating network traffic including interpreting logs and packet captures 

Experience (Preferred) 

  • Experience scripting solutions using vendor and open-source tools’ APIs 

  • Knowledge of MITRE ATT&CK Framework 

  • Proficiency with Python or other scripting languages 

  • Partner with threat intel teams for the discovery, detection, and mitigation of threats 

  • Threat hunting - Leverages offensive cyber tactics to identify threats within the network and perform guided searches throughout the environment utilizing known cyber tactics.  

  • Threat hunting - Have a strong cybersecurity background and know how to proactively hunt and investigate threats, be able to use code to automate investigative actions, and be proficient in scripting languages, such as Python. 

Soft Skills 

  • Experience communicating threats and findings in a cross-team setting 

  • Demonstrated problem solving skills with an ability to develop creative alternatives to complex problems, as well as continuous process improvement skills 

  • Demonstrated ability to handle sensitive information 

  • Ability to establish credibility and working relationships with a wide range of personnel, including operations and management 

  • Solid understanding of project management principles, including a demonstrated ability to multi-task effectively 

Nature and Scope:
This position typically reports to Manager or Sr. Manager
This position has 0 Direct Reports

Environment:
1. Located in a comfortable indoor area. Any unpleasant conditions would be infrequent and not objectionable.
Travel:
No travel required.

©2025 Fevrok. All Rights Reserved.