Cybersecurity Analyst
Toshiba.com
Office
West Allis, Wisconsin, United States; Houston, Texas, United States
Full Time
Role Summary
We are seeking a skilled and motivated mid-level Cybersecurity Analyst to help strengthen our defenses against evolving cyber threats. In this role, you will monitor, investigate, and respond to security events while also contributing to long-term security improvements. The ideal candidate has proven experience, takes ownership of incident response, and can work across teams to drive results.
Key Responsibilities
- Monitor, analyze, and investigate security events, alerts, and incidents to identify threats and anomalies
- Act as a primary responder during security incidents, handling detection, analysis, triage, containment, eradication, and recovery
- Conduct root cause analysis and document findings for leadership review
- Perform vulnerability assessments, coordinate with teams, and drive remediation efforts
- Support proactive threat hunting and detection of suspicious activities
- Assist in configuring, maintaining, and tuning security tools, including firewalls, IDS/IPS, EDR, and email security platforms
- Contribute to security and compliance initiatives (ISO 27001, NIST CSF, Zero Trust) and internal audits
- Support security awareness campaigns and phishing defense programs
- Recommend improvements to tools, processes, and playbooks
- Develop and refine runbooks, procedures, and standards to improve SOC efficiency
- Research emerging threats, attack vectors, AI related risks and industry standards to keep defenses current
- Develop, implement, and enforce security policies, procedures, and best practices
- Apply strong problem-solving skills to handle moderately complex incidents
Qualifications
- 4–6 years of hands-on experience in cybersecurity, SOC, or information security roles
- Strong knowledge of network protocols (TCP/IP), operating systems (Windows, Linux), and core security concepts
- Familiarity with attack techniques, endpoint protection, malware behavior, and cloud defense strategies
- Proven experience using SIEM platforms, writing queries, and analyzing alerts
- Awareness of AI security risks (e.g., model manipulation, data poisoning, prompt injection) and willingness to learn and apply best practices in securing AI-driven systems
- Demonstrated ability to perform root cause analysis and explain findings to both technical and non-technical audiences
- Experience automating repetitive tasks and scripting for analysis or reporting
- Familiarity with log analysis and query languages
- Hands-on experience with threat hunting methodologies
- Excellent communication skills
- Experience with cloud security monitoring (AWS, Azure, or GCP)
- Understanding of regulatory and compliance frameworks (ISO, NIST, GDPR, CIS, etc.)
- Relevant certifications (Security+, CySA+, GSEC, CEH, CC, SSCP)