Principal Cybersecurity Analyst
12 Month Contract
Location: Greensboro, NC (Hybrid, 2-3x per week)
Monday-Friday / 2pm -10pm
$85-$90/hour W2
Our long-standing client, one of the largest automobile and equipment manufacturers in the world, has been steadily growing for almost 100 years. With over 100,000 employees in 18 countries, this $47B company has a worldwide reputation for being an excellent company to work for. Having supported various teams with long-tenured employees, the organization has a history of low turnover, offering an impressive benefits package, great work-life balance, and promotional opportunities to grow with a multinational leader.
As a Principal Cybersecurity Analyst, you will be a senior technical leader within the Global Cybersecurity Operations Center (CSOC). This role combines expert-level hands-on incident response, advanced threat hunting, and digital forensics with strategic cybersecurity leadership. You will play a critical role in shaping CSOC strategy, working alongside the Head of CSOC to refine detection, response, and intelligence capabilities to proactively defend against emerging threats. As a recognized subject matter expert (SME), you are expected to stay ahead of cyber threat trends, attack methodologies, and adversary tactics, ensuring the CSOC is future-ready and resilient against evolving cyber threats.
Responsibilities:
- Define and evolve CSOC strategy to address emerging cyber threats, aligning detection and response with business risk.
- Lead incident response for advanced threats, including nation-state APTs, ransomware, and insider risks.
- Conduct proactive threat hunting using behavioral analytics and adversary tracking.
- Develop and optimize custom detection logic in SIEM, EDR, and network security tools.
- Correlate threat intelligence and telemetry to uncover persistent threats and attack patterns.
- Drive SOC maturity through automation, advanced analytics, and intelligence-led operations.
- Partner with engineering and IT teams to strengthen enterprise security architecture and tooling.
- Lead security automation (SOAR) initiatives and develop playbooks for automated threat response.
- Mentor and coach SOC analysts (L1–L3) while delivering advanced training and simulation exercises.
- Serve as a strategic advisor to leadership, contributing to security policy, resilience planning, and executive briefings.
Qualifications:
- Bachelor’s or Master’s degree in Cybersecurity, Computer Science, or a related field.
- CISSP, GCIH, GCFA, GCFE, GNFA, OSCP, CCTHP, CTIA, or CISM certified.
- 10+ years of hands-on cybersecurity experience, with deep expertise in SOC operations, incident response, and cyber threat intelligence.
- Demonstrated experience leading complex investigations into APTs, cybercrime operations, and enterprise-wide security incidents.
- Hands-on experience with industry-leading SIEM, EDR, IDS/IPS, forensic tools, and threat intelligence platforms.
- Expert understanding of nation-state cyber threats, APT campaigns, and cybercriminal ecosystems.
- Strong working knowledge of MITRE ATT&CK, Diamond Model, Cyber Kill Chain, and TIBER-EU methodologies.
- Proficiency in Python, PowerShell, or Bash for security automation, log parsing, and threat hunting.
Category Code: JN008