Security Technical Analyst

Job Type: Contract
Work Flexibility: Remote
Location: Pleasanton CA Vacaville CA
Required Skills: CrowdStrike Forensics Proofpoint SentinelOne Splunk Wireshark

Role: Security Technical Analyst
Location: Pleasanton/Vacaville, CA (Remote with occasional onsite)
Duration: 12+ Months
Pay Rate: $75 to $80

Overview: The Security Technical Analyst will support an Enterprise Security organization, providing deep technical expertise in incident response, threat analysis, and security operations. The consultant will act as a subject matter expert, supporting daily security operations while contributing to strategic security initiatives and mentoring internal staff.

Must Haves:

  • 5+ years of hands-on experience in Information Security, Incident Response, and/or Digital Forensics
  • Proven, recent Incident Response experience, including: Threat detection, triage, investigation, containment, eradication, and recovery
  • Hands-on experience with Incident Response/Security tools, such as: EDR/XDR platforms (e.g., CrowdStrike, Defender, SentinelOne), Email security platforms (e.g., Proofpoint or equivalent), SIEM platforms (Splunk, Sentinel, QRadar, or similar)
  • Ability to identify and analyze threats without relying solely on automated tools, including: Log analysis, Network traffic analysis, Email header and payload analysis, Manual IOC identification and validation
  • Experience running or supporting simulated phishing campaigns, including: Campaign execution, Metrics analysis, User awareness or training support
  • Strong Threat Intelligence (TI) experience, including: Consuming TI feeds, Applying IOCs to active investigations, Translating intelligence into actionable security outcomes
  • Experience performing forensic analysis using industry-standard tools and processes
  • Strong documentation and reporting skills for executive and technical audiences

Preferred/Desired Qualifications:

  • CISSP, CCFP, or equivalent certifications: (Other acceptable alternatives: CISM, CISA, CHFI, GCIA, GCIH, Security+, CEH)
  • Prior experience in public-sector, regulated, or enterprise security environments
  • Experience developing: Standard Operating Procedures (SOPs), Incident Response playbooks, Training or mentoring materials
  • Prior mentoring or knowledge-transfer experience

Key Responsibilities:

  • Proactively identify, assess, and respond to security threats affecting users, networks, systems, and data
  • Investigate security incidents and intrusions, including advanced and persistent threats
  • Perform detailed analysis of anomalous behavior, attacks, and indicators of compromise
  • Conduct forensic investigations using security and forensic tools
  • Apply Threat Intelligence to identify current risks and prevent future incidents
  • Develop clear, actionable incident reports and security documentation
  • Collaborate with IT, security, and business stakeholders to mitigate threats
  • Contribute to security awareness initiatives, including simulated phishing campaigns and training
  • Participate in security projects while supporting day-to-day operational duties
  • Develop and maintain SOPs, runbooks, and training documentation
  • Mentor and share knowledge with team members

Apply for this position

Allowed Type(s): .pdf, .doc, .docx