Description
DOT Security’s mission is to improve the security posture of client organizations by providing detection, response, risk management, and compliance services as identified and required. DOT Security will implement processes, technology, and subject matter expert personnel to monitor and respond to client needs in the cybersecurity and compliance space. Working with client organizations, DOT Security will continuously measure and improve internal processes and technology, which will translate to improved services provided to the client.
DOT Security is seeking team members who are passionate about Cybersecurity, detailed-oriented, desire for continuous learning, and enjoys working in a collaborative environment. We provide our employees with a career progression path, that challenges our team to grow as cybersecurity professionals with strong cybersecurity skills. As a member of Dot Security, you will get the opportunity to work from a brand-new, state of the art Security Operations Center (SOC) facility.
What you will be doing:
As a Senior Cybersecurity Analyst, you’ll play a key leadership role on the front lines of cyber defense, serving as both a hands-on expert and a mentor within our Security Operations Center. You'll lead advanced threat detection, analysis, and response efforts, proactively hunt for adversary activity, and continuously enhance the cybersecurity posture of our clients. This role is ideal for experienced analysts who thrive in fast-paced environments and are passionate about stopping sophisticated threats before they cause harm.
This is an on-site position working out of the DOT Security - Security Operations Center in Mettawa, IL.
Responsibilities
- Lead the investigation of real-time alerts from SIEM platforms and other security tools, ensuring timely identification of potential threats
- Perform in-depth forensic analysis of firewall logs, IDS/IPS alerts, and packet captures to validate or dismiss security events
- Correlate information across multiple data sources to detect advanced persistent threats (APTs), identify attack paths, and assess risk
- Author detailed incident reports and provide high-impact recommendations to internal and external stakeholders
- Drive threat-hunting initiatives based on intelligence feeds, behavioral analytics, and emerging TTPs
- Identify and assess indicators of compromise (IOCs), attack patterns, and threat actor behavior to stay ahead of adversaries
- Perform in-depth investigations of phishing campaigns, lateral movement attempts, and zero-day exploitation tactics
- Collaborate with threat intelligence teams to refine detection use cases and enrich alerting logic
- Act as a lead responder for escalated incidents, guiding triage, containment, remediation, and recovery activities
- Refine and execute incident response playbooks; contribute to the continuous evolution of SOC processes
- Tune security toolsets to improve signal-to-noise ratios, reduce false positives, and increase detection efficacy
- Provide mentorship and knowledge-sharing to junior analysts to build team capability
- Partner with infrastructure and engineering teams to implement improvements based on SOC findings
- Design and maintain custom detection rules and alerting logic aligned to evolving threat landscapes
- Lead efforts to enhance SOC workflows through automation, process improvement, and playbook development
Things We Are Looking For
Core Competencies
- Strong critical thinking and investigative mindset with the ability to independently solve complex security challenges
- Excellent written and verbal communication skills, including the ability to clearly explain findings to non-technical audiences
- Demonstrated leadership in SOC environments and a track record of driving measurable improvements in threat detection or response
Technical & Cybersecurity Expertise
- Deep understanding of modern cyber threats, threat actor behavior, and exploitation methods
- Proficiency with the MITRE ATT&CK framework and threat intelligence application
- Experience with advanced attack types, including buffer overflows, code injection, covert channels, and malware evasion tactics
- Strong grasp of networking fundamentals (TCP/IP, OSI model) and security infrastructure (firewalls, VPNs, SIEM, EDR/XDR, etc.)
Hands-On Experience
- 5+ years of experience handling/leading SOC incident or investigations, a plus
- Proven experience with enterprise-grade SIEM tools and log analysis platforms
- Background in IT infrastructure roles such as Systems Administrator, Network Engineer, or similar, with a security-first mindset
- Experience performing malware analysis or reverse engineering is a strong plus
Education
- Bachelor’s degree in Cybersecurity, Computer Science, Information Technology, or a related field (or equivalent practical experience)
- Master’s degree or additional years of relevant hands-on experience preferred
High Preferred Certifications
- eLearn Certified Threat Hunting Professional (ecthp)
- GIAC Certified Detection Analyst (GCDA)
- GIAC Security Operations Certified GSOC
- SANS SEC555
- Blue Team Level 2
Benefits
- Expected salary range of $85,000-$115,000
- 20 days of PTO
- 12+ paid holidays
- Flexible Sick Day Policy
- Paid Parental Leave
- Comprehensive Health, Disability Life, Dental and Vision Plans
- 401(K) discretionary match & retirement plans
- Continued education reimbursement
- On-going training & development opportunities
#LI-OnSite