In the past two years, more than a trillion dollars have been invested in software companies at record prices. And in many cases, the underlying tech is the greatest enabler to the business strategy. But has the approach to govern technology value creation caught up to the magnitude of the risk?
We believe a better way is possible – a more programmatic, proactive approach to actively manage technology throughout the investment lifecycle – and that’s what we do.
Our role
We know that technology can create truly transformative change, and its role in business is only growing. Crosslake is here to support the changemakers and help them buy, build and run better technology.
What we value
You could be a good fit for Crosslake if you see yourself reflected in our guiding values:
Service. We effect change by empowering others.
Curiosity. We believe great advice starts with deep understanding.
Credibility. Our expertise is earned and proven.
Commitment. It’s our privilege to serve clients in their critical moments.
Creativity. We are inspired by the constant pursuit of better.
Overview
We are seeking a Security Analyst with experience conducting compromise assessments and advanced threat detection activities. The analyst will play a key role in identifying potential breaches, evaluating security posture, and providing actionable insights to reduce organizational risk. This role involves close collaboration with clients and internal teams to assess environments for evidence of malicious activity, uncover gaps in defenses, and recommend remediation strategies.
(this position is US based, 1099, remote role )What we believe In the past two years, more than a trillion dollars have been invested in software companies at record prices. And in many cases, the underlying tech is the greatest enabler to the business strategy. But has the approach to govern technology value creation caught up to the magnitude of the risk? We believe a better way is possible – a more programmatic, proactive approach to actively manage technology throughout the investment lifecycle – and that’s what we do. Our role We know that technology can create truly transformative change, and its role in business is only growing. Crosslake is here to support the changemakers and help them buy, build and run better technology. What we value You could be a good fit for Crosslake if you see yourself reflected in our guiding values: Service. We effect change by empowering others. Curiosity. We believe great advice starts with deep understanding. Credibility. Our expertise is earned and proven. Commitment. It’s our privilege to serve clients in their critical moments. Creativity. We are inspired by the constant pursuit of better. OverviewWe are seeking a Security Analyst with experience conducting compromise assessments and advanced threat detection activities. The analyst will play a key role in identifying potential breaches, evaluating security posture, and providing actionable insights to reduce organizational risk. This role involves close collaboration with clients and internal teams to assess environments for evidence of malicious activity, uncover gaps in defenses, and recommend remediation strategies.
Responsibilities
Perform compromise assessments across enterprise networks, identity platforms, cloud environments, and endpoints to detect active or historical intrusions.
Identify, analyze, and validate indicators of compromise (IOCs), malicious artifacts, and persistence mechanisms.
Conduct threat hunting using endpoint and log data to uncover stealthy adversary activity.
Leverage forensic tools to analyze system images, memory captures, and network traffic for signs of malicious behavior.
Map adversary techniques to the MITRE ATT&CK framework and provide context on TTPs observed.
Develop and deliver detailed technical and executive-level reports summarizing findings, risk implications, and prioritized remediation steps.
Collaborate with incident response teams, SOC analysts, and client IT/security staff to validate findings and strengthen detection capabilities.
Contribute to the continuous improvement of methodologies, playbooks, and automation for compromise assessments.
Required Qualifications
4-8 years of experience in cybersecurity, digital forensics, or incident response.
Experience with all “Tool Categories and Examples” categories and hands-on experience with at minimum one tool in each section
Strong familiarity with public cloud providers (e.g. Amazon Web Services, Google Cloud, Microsoft Azure)
Strong knowledge of threat actor tactics, techniques, and procedures (TTPs) and familiarity with MITRE ATT&CK.
Experience conducting forensic analysis of endpoints, logs, and network data.
Strong written and verbal communication skills, with ability to create reports tailored to both technical and executive audiences.
Industry certifications such as GCFA, GNFA, GCIH, CySA+, or Security+. (Preffered)
Diese Cookies sind für das Funktionieren der Website erforderlich und können in unseren Systemen nicht abgeschaltet werden. Sie können Ihren Browser so einstellen, dass er diese Cookies blockiert, aber dann könnten einige Teile der Website nicht funktionieren.
Sicherheit
Benutzererfahrung
Zielgruppenorientierte Cookies
Diese Cookies werden über unsere Website von unseren Werbepartnern gesetzt. Sie können von diesen Unternehmen verwendet werden, um ein Profil Ihrer Interessen zu erstellen und Ihnen an anderer Stelle relevante Werbung zu zeigen.
Google Analytics
Google Ads
Wir benutzen Cookies
🍪
Unsere Website verwendet Cookies und ähnliche Technologien, um Inhalte zu personalisieren, das Nutzererlebnis zu optimieren und Werbung zu indvidualisieren und auszuwerten. Indem Sie auf Okay klicken oder eine Option in den Cookie-Einstellungen aktivieren, stimmen Sie dem zu.
Die besten Remote-Jobs per E-Mail
Schliess dich über 5'000+ Personen an, die wöchentlich Benachrichtigungen über Remote-Jobs erhalten!