CrawlJobs Logo

Cyber Security Analyst - Level 3

vodafone.com Logo

Vodafone

Location Icon

Location:
India , Pune

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

We are seeking a skilled Cyber Security Analyst (Level 3) to strengthen our Cyber Defence Security team at VOIS. The individual will serve as a senior technical expert within the Cyber Security Operations Centre (CSOC), leading complex investigations, providing guidance to team members, developing processes, and enhancing SIEM-related capabilities. This role suits an experienced security professional with strong analytical ability, deep SIEM expertise, and a passion for building resilient, efficient cyber defence operations.

Job Responsibility:

  • Lead end-to-end analysis, triage, and investigation of security alerts and incidents
  • Serve as the primary subject matter expert for escalated technical queries within the CSOC
  • Drive automation initiatives and continuous process stabilisation efforts
  • Collaborate closely with onshore teams to refine alert logic, reduce false positives, and optimise detection mechanisms
  • Create and maintain Standard Operating Procedures (SOPs), Knowledge Error Databases (KEDBs), playbooks, and knowledge base articles
  • Mentor and guide new joiners to build team capability and confidence
  • Produce management reports covering alert trends, investigation insights, and process performance
  • Participate and contribute to daily stand-up discussions and incident review sessions
  • Conduct knowledge‑sharing sessions to drive continuous learning within the team
  • Engage with local market CSIRT teams to support ongoing cases and ensure positive customer experience

Requirements:

  • Bring 10+ years of experience in SOC operations, SIEM technologies, event analysis, and incident investigation
  • Have strong hands-on expertise with SIEM platforms such as ArcSight, Splunk, QRadar, LogRhythm, or similar technologies
  • Demonstrate solid understanding of network and security concepts, correlation logic, and detection mechanisms
  • Possess analytical thinking and clear written and verbal communication skills
  • Experienced in cloud technologies and global customer environments
  • Hold an academic background in Computer Science, Information Technology, Engineering, or a related discipline
  • Preferably hold security certifications such as CISM, CISSP, or SANS credentials
  • Known for integrity, self-motivation, collaborative working, and cultural sensitivity
  • Able to guide and coach new team members effectively
What we offer:
  • Opportunity to work as a senior specialist influencing cyber defence capabilities across global markets
  • Exposure to advanced SIEM technologies, cloud environments, and global threat landscapes
  • Ability to lead improvement initiatives and shape operational efficiencies
  • Continuous learning through brown-bag sessions, cross‑team collaboration, and advanced certification pathways
  • Leadership opportunities through mentoring and guiding team members

Additional Information:

Job Posted:
March 22, 2026

Work Type:
Hybrid work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Cyber Security Analyst - Level 3

Cryptologic Cyber Planner 3

We are seeking a dynamic Cryptologic Cyber Planner with hands-on experience in s...
Location
Location
United States , Central Maryland
Salary
Salary:
141000.00 - 189000.00 USD / Year
realmone.com Logo
RealmOne
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Doctoral Degree with 4 years of relevant experience
  • Master’s degree with 6 years of relevant experience
  • Bachelor’s Degree with 8 years of relevant experience
  • Associates degree with 10 years of experience
  • HS diploma or GED with 12 years of experience
  • Bachelor’s Degree in any field is acceptable
  • Relevant experience must be in an area directly related to a DoD mission (e.g. collection, cyber and intelligence analysis) and/or similar mission and include strategic and/or operational level planning (e.g. joint operations)
  • External engagement/collaboration experience (e.g. participation in cross-Agency working groups, JDA, field experience, and external customer support
  • Position requires active Security Clearance with appropriate Polygraph
Job Responsibility
Job Responsibility
  • Strategic and operational planning
  • Driving collaboration across agencies
  • Working closely with external partners to deliver impactful cyber and intelligence solutions
  • Shaping mission success through innovative approaches in collection, analysis, and external customer engagement
  • Supporting a team of Data Scientists, Cryptologic Computer Scientists, Cryptanalytic Computer Scientists, Cryptologic Cyber Planners, Intrusion Analysts, Protocol Analysts, Signals Analysts and Reverse Engineers
What we offer
What we offer
  • Medical: Three (3) rich healthcare options through CareFirst with 100% or majority company-paid premiums
  • Tax-advantaged health savings account available with generous employer contribution
  • Dental + Vision: 100% employer-paid for employees and family, with a buy-up option available
  • 401K – 10% TOTAL CONTRIBUTION – 5% safe harbor – 5% annual profit share (both immediately vested!)
  • 4 weeks starting PTO – 11 federal holidays + 2 floating holidays – Paid hours for company-required training
  • Access to FREE 24/7 learning via Udemy
  • Opportunities to participate in tech councils, industry initiatives, etc.
  • $7,500 annual Educational & Professional Development Assistance
  • Paid parental leave
  • Annual swag drops
  • Fulltime
Read More
Arrow Right

Exploitation Analyst

As cyber threats evolve and proliferate at a rapid pace, Altamira Technologies i...
Location
Location
United States , Annapolis Junction
Salary
Salary:
Not provided
altamiracorp.com Logo
Altamira Technologies
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security)
  • 18 semester hours of military training/coursework in networking, computer science, or cyber topics is equivalent to an associates degree
  • Relevant experience in computer or information systems design/development/analysis
  • Experience may include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration
  • Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course) will be considered towards the relevant experience/education requirement
  • In some cases, foreign language proficiency may also be used to satisfy experience requirements
  • recent Interagency Language Roundtable (ILR) scores are required to substantiate your proficiency level
  • Active TS/SCI with polygraph
  • Specific labor category determined by years of experience + educational degrees: Level 1: 2 years applicable experience with a bachelors degree, OR 4 years applicable experience with associate degree
  • Level 2: 2 years applicable experience with a PhD, OR 3 years applicable experience with a masters degree, OR 5 years applicable experience with a bachelors degree, OR 7 years applicable experience with an associate degree
Job Responsibility
Job Responsibility
  • Apply deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make operational adjustments as plans are executed
  • Be part of a team, working together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise
  • Apply innate curiosity and analytical talent to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights
  • Distill, document, contextualize and share findings--including any new tradecraft that you develop--with teammates, stakeholders, and intelligence consumers
Read More
Arrow Right

Exploitation Analyst

As cyber threats evolve and proliferate at a rapid pace, Altamira Technologies i...
Location
Location
United States , Annapolis Junction
Salary
Salary:
Not provided
altamiracorp.com Logo
Altamira Technologies
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Active TS/SCI with polygraph
  • Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security)
  • Relevant experience in computer or information systems design/development/analysis
  • Experience may include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration
  • 18 semester hours of military training/coursework in networking, computer science, or cyber topics is equivalent to an associates degree
  • Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course) will be considered towards the relevant experience/education requirement
  • In some cases, foreign language proficiency may also be used to satisfy experience requirements
  • recent Interagency Language Roundtable (ILR) scores are required to substantiate your proficiency level
  • Level 1: 2 years applicable experience with a bachelors degree, OR 4 years applicable experience with associate degree
  • Level 2: 2 years applicable experience with a PhD, OR 3 years applicable experience with a masters degree, OR 5 years applicable experience with a bachelors degree, OR 7 years applicable experience with an associate degree
Job Responsibility
Job Responsibility
  • Apply deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make operational adjustments as plans are executed
  • Be part of a team, working together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise
  • Apply innate curiosity and analytical talent to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights
  • Distill, document, contextualize and share findings--including any new tradecraft that you develop--with teammates, stakeholders, and intelligence consumers
Read More
Arrow Right

Digital Network Exploitation Analyst

Altamira is searching for a Digital Network Exploitation Analyst (DNEA) in Sarat...
Location
Location
United States , Saratoga Springs
Salary
Salary:
Not provided
altamiracorp.com Logo
Altamira Technologies
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Relevant experience must be in computer or information systems design/development/analysis roles
  • It may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration
  • Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course) may be considered towards the relevant experience requirement
  • Must have active TS/SCI with full scope polygraph
  • Specific labor category determined by years of experience + educational degrees: Level 1: 2 years’ applicable experience with a bachelor’s degree, OR 4 years’ applicable experience with associate degree
  • Level 2: 2 years’ applicable experience with a PhD, OR 3 years’ applicable experience with a master’s degree, OR 5 years’ applicable experience with a bachelor’s degree, OR 7 years’ applicable experience with an associate degree
  • Level 3: 4 years’ applicable experience with a PhD, OR 6 years’ applicable experience with a master’s degree, OR 8 years’ applicable experience with a bachelor’s degree, OR 10 years’ applicable experience with an associate degree
  • Level 4: 7 years’ applicable experience with a PhD, OR 9 years’ applicable experience with a master’s degree, OR 11 years’ applicable experience with a bachelor’s degree, OR 13 years’ applicable experience with an associate degree
  • Degree in Computer Science
  • Degree in related fields (e.g., Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computer architecture (not network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics)
Read More
Arrow Right

Senior Analyst, Cyber Security

The Senior Analyst, Cyber Security supports the Manager, Cybersecurity & Network...
Location
Location
Canada , Vancouver
Salary
Salary:
90300.00 - 129000.00 USD / Year
canfor.com Logo
Canfor
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Degree or diploma in IT or related field
  • 5+ years enterprise experience across multi-site environments
  • Professional-level Security certifications preferred
  • Strong troubleshooting, documentation, and communication skills
  • Hands‑on experience with Microsoft Defender, Sentinel, Purview, or equivalent
  • Experience managing cloud security for Azure/M365/SaaS
  • Demonstrated ability to collaborate with MDR/SOC teams
  • Experience with privacy legislation (PIPEDA, BC PIPA)
  • Experience developing or maintaining incident response playbooks
  • Threat-informed defense (MITRE ATT&CK familiarity)
Job Responsibility
Job Responsibility
  • Plan, design, and implement enterprise security solutions
  • Resolve Tier 3 incidents and outages
  • Execute security projects and coordinate vendors
  • Maintain accurate documentation, runbooks, and inventories
  • Support for Zero Trust architecture, including network segmentation, identity hardening, and continuous monitoring
  • Responsibilities related to cloud security across Azure, M365, SaaS, and hybrid workloads
  • Oversight of third‑party risk, recognizing increased vendor dependence
  • Work with MDR (Managed Detection & Response) providers such as Arctic Wolf to improve detection, triage, and response maturity
  • Responsibilities related to governance frameworks (NIST CSF 2.0, CIS Controls v8)
  • Integration with privacy compliance (PIPEDA, BC PIPA) and corporate policy governance
What we offer
What we offer
  • performance-based incentive plans
  • recognition programs
  • benefits
  • paid leaves
  • pension plans with base and matching contributions
  • savings options
  • robust health & well-being initiatives
  • development of our talent
  • value proposition that promotes diversity, equity and inclusion
  • Fulltime
Read More
Arrow Right

Cyber Security Analyst

We are looking for a skilled Cyber Security Analyst to join our team in Aurora, ...
Location
Location
United States , Aurora
Salary
Salary:
Not provided
https://www.roberthalf.com Logo
Robert Half
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Minimum 3–5 years of experience in corporate cybersecurity or IT networking roles
  • Strong knowledge of computing technologies, network architecture, firewalls, and endpoint protection systems
  • Familiarity with Microsoft operating systems, Active Directory, and Azure Conditional Access
  • Bachelor’s or Master’s degree in Computer Science or a related field with an emphasis on IT or networking
  • Proven ability to adapt to changing threat landscapes and maintain attention to detail
  • Experience working with compliance standards such as ISO 27009, NIST 800.171, and achieving Level 2 certifications
Job Responsibility
Job Responsibility
  • Perform threat analysis, monitor systems, and respond to cybersecurity incidents in a timely manner
  • Identify vulnerabilities and implement effective mitigation strategies to strengthen system security
  • Configure, maintain, and upgrade security systems including endpoint protection tools
  • Analyze security logs and data to detect potential threats and provide actionable reports
  • Develop and enforce cybersecurity policies and best practices to ensure compliance with industry standards
  • Conduct research on emerging threats and deliver cybersecurity training to end users
  • Collaborate on projects that align with the company’s security roadmap and compliance objectives
  • Assist with achieving organizational certifications, including Level 2 compliance
  • Support implementation of security measures within Microsoft ecosystems and Azure tools
  • Participate in continuous monitoring efforts to ensure robust protection against evolving threats
What we offer
What we offer
  • Benefits are available to contract/temporary professionals, including medical, vision, dental, and life and disability insurance
  • Hired contract/temporary professionals are also eligible to enroll in our company 401(k) plan
Read More
Arrow Right

Exploitation Analyst

As cyber threats evolve and proliferate at a rapid pace, Altamira Technologies i...
Location
Location
United States , Fort Gordon
Salary
Salary:
Not provided
altamiracorp.com Logo
Altamira Technologies
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security)
  • Relevant experience in computer or information systems design/development/analysis
  • Experience may include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration
  • Active TS/SCI with polygraph
  • Specific labor category determined by years of experience + educational degrees (Level 1: 2 years applicable experience with a bachelor's degree, OR 4 years applicable experience with associate degree
  • Level 2: 2 years applicable experience with a PhD, OR 3 years applicable experience with a master's degree, OR 5 years applicable experience with a bachelor's degree, OR 7 years applicable experience with an associate degree
  • Level 3: 4 years applicable experience with a PhD, OR 6 years applicable experience with a master's degree, OR 8 years applicable experience with a bachelor's degree, OR 10 years applicable experience with an associate degree
  • Level 4: 7 years applicable experience with a PhD, OR 9 years applicable experience with a master's degree, OR 11 years applicable experience with a bachelor's degree, OR 13 years applicable experience with an associate degree)
  • 18 semester hours of military training/coursework in networking, computer science, or cyber topics is equivalent to an associate's degree
  • Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course) will be considered towards the relevant experience/education requirement
Job Responsibility
Job Responsibility
  • Apply deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make operational adjustments as plans are executed
  • Be part of a team, working together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise
  • Apply innate curiosity and analytical talent to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights
  • Distill, document, contextualize and share findings--including any new tradecraft that you develop--with teammates, stakeholders, and intelligence consumers
Read More
Arrow Right

Security Governance Analyst

The Security Governance Analyst is responsible for maintaining and monitoring th...
Location
Location
France , Toulouse Area
Salary
Salary:
Not provided
airbus.com Logo
Airbus
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Successful completion of an Academic degree in Information Technology, Information Security Management System or equivalent
  • Solid experience in Security
  • 1 to 3 years experience in Governance, Risk and Compliance
  • Must be a reliable, responsible self-starter with a demonstrated ability to work independently and prioritize effectively
  • Holder of security certifications (SSCP, ISO 27005 Risk Manager, ISO 27001 Auditor etc.) would be an asset
  • Knowledge of security regulations would be an asset
  • Knowledge of physical security would be an asset
  • Communication skills appropriate for interfacing at all levels of the organization including senior management and technical staff including documentation (top level policies, technical standards, etc.)
  • Must work effectively with others in a team environment with strong skills in stakeholder management
  • Project management skills and highly organized, capable of delivering projects on-time and on-budget
Job Responsibility
Job Responsibility
  • Maintain Security OKR and KPI’s
  • Assist with performance of Internal and 3rd party security audits and ensure security findings follow up until closure
  • Ensure Process owners perform RCAs of audit findings and close any actions arising from audits in a timely manner
  • Define the yearly company security audits and penetration testing strategy
  • Assist in the deployment of NAVBLUE’s security policy with the goal of Maintaining ISO 27001/2 certification using the policies, standards and procedures that have already been developed
  • Contribute to the preparation and dissemination of a Security Awareness Program to NAVBLUE staff
  • Maintain documentation at a level that meets the audit requirements ISO 27001/2
  • Help to develop and improve the IT Business Continuity procedures and processes and other applicable security regulations
  • Ensure the implementation and assessment of the security in NAVBLUE’s supply chain, and support the risk identification if needed
  • Be the security focal point and support the other functions with regards to customers request on security
  • Fulltime
Read More
Arrow Right