Dragonfli Group

Cybersecurity Analyst

  • People & Operations
  • San Antonio, TX
  • Intermediate
  • Full-time

Description

Company Overview:

Dragonfli Group LLC is a Washington, DC-based consulting firm specializing in cybersecurity and IT services. We support government agencies and large commercial enterprises, offering expertise in cyber defense, threat intelligence, and security operations.

Job Summary:

Dragonfli Group is seeking skilled Cyber Defense Analysts to provide cybersecurity monitoring and threat analysis. This role requires prior experience in a cybersecurity operations center (SOC), cyber threat hunting, and expertise in identifying and mitigating security threats. The analysts will support 24/7/365 security operations, with positions available for both standard business hours (Monday to Friday) and rotating 12-hour shifts for continuous coverage. This position is fully on-site in San Antonio, Texas.

Key Responsibilities:

  • Perform real-time monitoring, detection, and analysis of potential cyber threats using security tools.
  • Conduct proactive cyber threat hunting to identify advanced threats within the enterprise network.
  • Analyze network traffic, system logs, and security alerts to differentiate between legitimate activity and potential threats.
  • Create and maintain a common intelligence picture, integrating threat intelligence sources.
  • Develop and refine security incident detection methodologies and alerting criteria.
  • Document and escalate security incidents, including event history, status, and potential impact.
  • Utilize cyber defense tools for continual monitoring and analysis of security events.
  • Identify and assess threat tactics, techniques, and procedures (TTPs) employed by adversaries.
  • Perform event correlation using information from multiple sources to gain situational awareness.
  • Generate daily summary reports on security events, threat activities, and emerging risks.
  • Coordinate with enterprise-wide cybersecurity teams to validate and respond to network alerts.
  • Provide expertise in writing, reviewing, and editing cyber intelligence assessments.
  • Optimize and tune cybersecurity tools to reduce false positives and improve detection capabilities.

Requirements

Required Qualifications & Experience:

  • Prior experience working in a SOC environment with hands-on cybersecurity monitoring and response.
  • Cyber threat hunting experience with demonstrated ability to proactively detect and neutralize threats.
  • Strong analytical skills to identify cyber threats and evaluate their potential impact.
  • Experience with security tools such as SIEMs (Splunk, ELK, ArcSight), EDR (CrowdStrike, SentinelOne), and network forensics tools.
  • Knowledge of cyber threat intelligence frameworks such as MITRE ATT&CK.
  • Experience in writing and reviewing cyber intelligence reports and security assessments.
  • Familiarity with common attack vectors, malware analysis, and incident response processes.
  • Strong verbal and written communication skills.
  • Relevant certifications (e.g., Security+, CEH, GCIH, CISSP) are preferred.

Benefits

Insurance - health, dental, and vision

PTO

401K and employer match