What are the responsibilities and job description for the Cybersecurity Analyst position at Dragonfli Group?
Company Overview:
Dragonfli Group LLC is a Washington, DC-based consulting firm specializing in cybersecurity and IT services. We support government agencies and large commercial enterprises, offering expertise in cyber defense, threat intelligence, and security operations.
Job Summary:
Dragonfli Group is seeking skilled Cyber Defense Analysts to provide cybersecurity monitoring and threat analysis. This role requires prior experience in a cybersecurity operations center (SOC), cyber threat hunting, and expertise in identifying and mitigating security threats. The analysts will support 24/7/365 security operations, with positions available for both standard business hours (Monday to Friday) and rotating 12-hour shifts for continuous coverage. This position is fully on-site in San Antonio, Texas.
Key Responsibilities:
Required Qualifications & Experience:
Insurance - health, dental, and vision
PTO
401K and employer match
Dragonfli Group LLC is a Washington, DC-based consulting firm specializing in cybersecurity and IT services. We support government agencies and large commercial enterprises, offering expertise in cyber defense, threat intelligence, and security operations.
Job Summary:
Dragonfli Group is seeking skilled Cyber Defense Analysts to provide cybersecurity monitoring and threat analysis. This role requires prior experience in a cybersecurity operations center (SOC), cyber threat hunting, and expertise in identifying and mitigating security threats. The analysts will support 24/7/365 security operations, with positions available for both standard business hours (Monday to Friday) and rotating 12-hour shifts for continuous coverage. This position is fully on-site in San Antonio, Texas.
Key Responsibilities:
- Perform real-time monitoring, detection, and analysis of potential cyber threats using security tools.
- Conduct proactive cyber threat hunting to identify advanced threats within the enterprise network.
- Analyze network traffic, system logs, and security alerts to differentiate between legitimate activity and potential threats.
- Create and maintain a common intelligence picture, integrating threat intelligence sources.
- Develop and refine security incident detection methodologies and alerting criteria.
- Document and escalate security incidents, including event history, status, and potential impact.
- Utilize cyber defense tools for continual monitoring and analysis of security events.
- Identify and assess threat tactics, techniques, and procedures (TTPs) employed by adversaries.
- Perform event correlation using information from multiple sources to gain situational awareness.
- Generate daily summary reports on security events, threat activities, and emerging risks.
- Coordinate with enterprise-wide cybersecurity teams to validate and respond to network alerts.
- Provide expertise in writing, reviewing, and editing cyber intelligence assessments.
- Optimize and tune cybersecurity tools to reduce false positives and improve detection capabilities.
Required Qualifications & Experience:
- Prior experience working in a SOC environment with hands-on cybersecurity monitoring and response.
- Cyber threat hunting experience with demonstrated ability to proactively detect and neutralize threats.
- Strong analytical skills to identify cyber threats and evaluate their potential impact.
- Experience with security tools such as SIEMs (Splunk, ELK, ArcSight), EDR (CrowdStrike, SentinelOne), and network forensics tools.
- Knowledge of cyber threat intelligence frameworks such as MITRE ATT&CK.
- Experience in writing and reviewing cyber intelligence reports and security assessments.
- Familiarity with common attack vectors, malware analysis, and incident response processes.
- Strong verbal and written communication skills.
- Relevant certifications (e.g., Security , CEH, GCIH, CISSP) are preferred.
Insurance - health, dental, and vision
PTO
401K and employer match