NeoSystems Logo

NeoSystems

Cybersecurity Operations Analyst II

Posted 10 Days Ago
In-Office or Remote
Hiring Remotely in United States
Mid level
In-Office or Remote
Hiring Remotely in United States
Mid level
The Cybersecurity Operations Analyst II handles incident response, monitoring, and vulnerability management in Microsoft 365 E5 environments, ensuring compliance and effective threat detection.
The summary above was generated by AI

The Cybersecurity Operations Analyst II (COA2) is responsible for the initial triage and monitoring of security events, working exclusively in Microsoft 365 E5 environments, and helping to enforce CMMC 2.0 requirements.   

The COA 2 is responsible for advanced incident response, proactive threat hunting, vulnerability lifecycle management, and escalation support for Microsoft 365 E5 customers. This role bridges the gap between COA 1 alert/triage and senior analyst/engineering roles, working in-depth with Microsoft Defender XDR, external SOCs, and industry-standard vulnerability tools like Qualys and Tenable.  

Role & Responsibilities: 

Advanced Threat Detection & Response  

  • Lead investigations of escalated alerts across the following:  
  • Defender for Endpoint  
  • Defender for Office 365  
  • Defender for Cloud Apps (MCAS)  
  • Defender for Identity (formerly ATA)  
  • Microsoft Defender XDR  
  • Correlate log and alert data to detect lateral movement, privilege escalation, anomalous behavior, and advanced persistent threats using Microsoft Defender data and investigative tools from external SOC vendors.  
  • Conduct live incident response across customer tenants (containment, eradication, recovery) in accordance with CMMC 2.0 and NIST 800-171 incident response standards.  
  • Coordinate post-incident documentation including RCA, timeline analysis, and recommendations.  

Incident Handling & Response Support  

  • Assist senior analysts during active incidents by collecting logs, screenshots, and device/user activity history.  
  • Document timelines, observations, and artifacts to support root cause analysis and reporting.  
  • Conduct follow-up on low-risk alerts and phishing investigations (possibly with supervised guidance).  

Customer Interaction & Ticket Management  

  • Document findings and updates in the SOC ticketing system with accuracy and clarity.  
  • Respond to basic client inquiries related to user behavior, alert definitions, or mitigation steps under supervision.  
  • Follow documented workflows to support CMMC 2.0 incident response requirements, including reporting timelines and evidence handling.  

Threat Hunting & Detection Engineering Support  

  • Conduct proactive threat hunting using KQL queries in Microsoft Sentinel and hunting dashboards in Defender XDR.  
  • Assist with tuning analytics rules and alert thresholds and reducing false positives in detection logic.  
  • Work with external SOC services to tune rules and alert thresholds.  
  • Identify opportunities for new detections based on threat intelligence and customer risk profiles.  
  • Support configuration and optimization of Microsoft Sentinel data connectors, workbooks, automation rules, and response playbooks.  
  • Monitor log ingestion and telemetry gaps from M365 Defender products, Entra ID, and endpoint clients.  
  • Maintain detection signatures and IOCs provided by Microsoft, ISACs, or third-party feeds.  

Vulnerability & Patch Management  

  • Manage operating system and third-party software patching cycles for customer environments.  
  • Prioritize and manage vulnerability remediation in coordination with infrastructure teams and customer needs.  
  • Perform vulnerability scans using Qualys, Tenable.io, or Nessus across hybrid and cloud environments.  
  • Analyze, prioritize, and track vulnerabilities by CVSS score, exploitability, and exposure relevance to customer mission.  
  • Collaborate with customer IT and endpoint teams to validate and remediate critical vulnerabilities in operating systems, applications, and Microsoft 365 services.  
  • Report on vulnerability trends and threat exposure as part of recurring customer security reviews.  

Customer Engagement & Documentation  

  • Participate in high-touch incident communications and brief customers on security events, containment actions, and risk.  
  • Generate clear, actionable incident summaries and vulnerability reports tailored for both technical and executive audiences.  
  • Assist with compliance evidence collection during audits or IR tabletop exercises.  
  • Lead or assist in conducting security awareness training campaigns and tabletop exercises for customers.  
  • Assist in gathering and assembling audit evidence to support compliance assessments. 

Competencies / Skills: 

  • 3–5 years of cybersecurity experience, with at least 1 year in a SOC, IR, or detection-focused role.  
  • Strong knowledge of attacker TTPs, MITRE ATT&CK, and Zero Trust principles.  
  • Hands-on experience with Microsoft 365 E5 security stack.  
  • Familiarity with CMMC 2.0, NIST 800-171, and FedRAMP security controls.  
  • Experience conducting or responding to vulnerability scans and remediation workflows.  
  • Security+ or SC-900 certification  
  • Must be a U.S. citizen eligible for ITAR-compliant work.  

Preferred: 

  • Certified Ethical Hacker (CEH)  
  • Microsoft SC-100, SC-200, SC-300, or SC-400 certifications  
  • Microsoft AZ-500  

 

Where required by law, this posting includes a good‑faith pay range for candidates who will perform the role in specific jurisdictions. For other locations, the actual compensation may differ. Final compensation will be determined based on qualifications, experience, skills, work location, internal equity, and current market data. This job posting is not a contract or promise of employment or any particular compensation, and any employment offer will be set out in a written offer letter. 

Equal Opportunity Employer
This employer is required to notify all applicants of their rights pursuant to federal employment laws. For further information, please review the Know Your Rights notice from the Department of Labor.

Top Skills

Kql
Microsoft 365 E5
Microsoft Defender Xdr
Microsoft Sentinel
Qualys
Tenable

Similar Jobs

3 Minutes Ago
In-Office or Remote
IN, USA
250K-300K Annually
Senior level
250K-300K Annually
Senior level
Consumer Web • eCommerce • Food • Healthtech • Natural Language Processing • Social Impact
Lead the ML organization, define strategic direction, deliver personalized member experiences, and partner with cross-functional teams to integrate ML solutions across Thrive Market's platform.
Top Skills: BertData ScienceLlmsMachine LearningMulti-Stage PipelinesNlp
3 Hours Ago
Remote or Hybrid
US
30K-60K Annually
Senior level
30K-60K Annually
Senior level
Agency • Gaming • Marketing Tech • Mobile • Analytics
Provide strategic leadership in packaging technology solutions and manage supply chain operations for the India market, ensuring quality supplier partnerships and program execution.
Top Skills: Microsoft Office 365
3 Hours Ago
Remote
Texas, USA
89K-127K Annually
Mid level
89K-127K Annually
Mid level
Healthtech • Logistics • Pharmaceutical
The Infrastructure Administrator leads cloud and on-premise infrastructure management, oversees engineering resources, and ensures system stability and security for veterinary solutions.
Top Skills: AzureDatabasesJavaJbossLinuxNetworkingUbuntuVirtualizationVpnWildflyWindows Server

What you need to know about the NYC Tech Scene

As the undisputed financial capital of the world, New York City is an epicenter of startup funding activity. The city has a thriving fintech scene and is a major player in verticals ranging from AI to biotech, cybersecurity and digital media. It also has universities like NYU, Columbia and Cornell Tech attracting students and researchers from across the globe, providing the ecosystem with a constant influx of world-class talent. And its East Coast location and three international airports make it a perfect spot for European companies establishing a foothold in the United States.

Key Facts About NYC Tech

  • Number of Tech Workers: 549,200; 6% of overall workforce (2024 CompTIA survey)
  • Major Tech Employers: Capgemini, Bloomberg, IBM, Spotify
  • Key Industries: Artificial intelligence, Fintech
  • Funding Landscape: $25.5 billion in venture capital funding in 2024 (Pitchbook)
  • Notable Investors: Greycroft, Thrive Capital, Union Square Ventures, FirstMark Capital, Tiger Global Management, Tribeca Venture Partners, Insight Partners, Two Sigma Ventures
  • Research Centers and Universities: Columbia University, New York University, Fordham University, CUNY, AI Now Institute, Flatiron Institute, C.N. Yang Institute for Theoretical Physics, NASA Space Radiation Laboratory

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account