ShorePoint is a cybersecurity services firm with a focus on high-profile, high-threat private and public-sector customers who demand experience and proven security models to protect their data. We are seeking a Senior Cyber Data Analyst who has significant experience analyzing data from multiple disparate sources with the goal of providing security and privacy insight in the federal market. This is a unique opportunity to shape the growth, development and culture of an exciting and emerging company in the cybersecurity market.


Roles and Responsibilities

  • Examines data from multiple disparate sources with the goal of providing security and privacy insight. Designs and implements custom algorithms, workflow processes, and layouts for complex, enterprise-scale data sets used for modeling, data mining, and research purposes.
  • Populate and maintain an intrusions database, and provide data analysis support; analyze data from sensors, network security devices and applications using the security information event management systems, log servers, application interfaces and device consoles provided.
  • Analyze reports to understand threat campaign(s) techniques, lateral movements and extract indicators of compromise (IOCs).
  • Performe Threat detection, Threat Hunting and trend analysis.
  • Document of evidence of system security compromise, generate of trend reports, and collect evidence of malicious or anomalous activity.
  • Senior Cyber Analyst must provide recommendations based on best practice and experience to develop processes that will enhance efficiencies needed to perform the above.

Required Skills

  • Strong analytical skills with the ability to collect, organize, analyze, and disseminate significant amounts of information with attention to detail and accuracy
  • Experience with information security devices (e. g., firewalls, and intrusion detection/prevention systems) and applications (e.g. security information management tools (Splunk preferred).
  • Technical expertise in the capabilities and techniques of hacker/hacktivist groups, criminal syndicates, and advanced persistent threats conducting computer network exploitation and attacks against the U.S. government resources and critical infrastructure.
  • Familiar with signatures, tactics, techniques and procedures associated with preparation for and execution/implementation of such attacks.
  • Experience with threat analysis and threat hunting
  • Experience with intelligence products.
  • Experience with early indications and warnings.
  • Experience with Open Source intelligence techniques.
  • Ability to function in a fast-paced environment and effectively manage multiple tasks simultaneously; coordinating resources and ensuring scheduled goals are met
  • Ability to make decisions and resolve problems effectively – Seek out information and data to evaluate, prioritize and formulate best solution or practice
  • Must be able to multi-task, work independently and as part of a team, share workloads,and deal with sudden shifts in project priorities

Desired Skills

  • Experience working in a network security incident response team, such as a Security Operations Center (SOC), Computer Emergency Response Team (CERT), Computer Incident Response Team (CIRT), Computer Incident Response Center (CIRC) or Cyber Security Incident Response Center (CSIRC).
  • Preferred experience with Splunk and EnCase

Education Requirement

  • BA/BS in Computer Science, Engineering or related technical IT field
  • Preferred – MA/MS in a technical/cyber-related field

Years of Experience Requirement

  • 7+ years of relevant cyber security experience

Certification Requirement

  • Relevant industry certification preferred


  • Arlington, VA

Security Clearance

  • Eligibility to obtain and maintain customer required security clearance

Sound like the job for you?

Send us a link to your resumé or portfolio to become part of our talent pool.

Click here to apply

Warning: Invalid argument supplied for foreach() in /var/www/wp-includes/class-wp-list-util.php on line 157