Finezi Inc.
IT - Cyber Security Threat Analyst / Specialist - Senior
Finezi Inc., Concord, California, us, 94527
IT - Cyber Security Threat Analyst / Specialist - Senior
About the Role
Biggest California’s energy Cybersecurity organization is seeking a
Senior Cyber Security Threat Analyst / Specialist
to join the
Monitoring & Response (M&R) Team
— the first line of defense in detecting, analyzing, and responding to cyber threats. This team continuously monitors their enterprise environment, leveraging advanced tools, threat intelligence, and proactive hunting to identify and mitigate malicious activity.
This role requires a
hands‑on cybersecurity professional
with strong analytical, investigative, and problem‑solving skills, capable of operating in a high‑tempo environment to defend critical utility infrastructure.
Key Responsibilities
Monitor cybersecurity events and alerts to identify potential threats and determine malicious activity.
Analyze malware, phishing, and other security incidents; elevate and coordinate with Incident Response as needed.
Perform proactive
threat hunting
based on intelligence from utility peers, ISACs, and internal data sources.
Conduct forensic analysis to trace sources of anomalous or suspicious behavior across systems.
Support vulnerability management, firewall management, and related cybersecurity processes through continuous feedback and metrics.
Research emerging threats and apply findings to improve detection and response strategies.
Perform system administration and integration tasks for security tools to enhance automation and efficiency.
Contribute to the development of cybersecurity strategy and operational improvements within the department.
Qualifications
High School Diploma or GED equivalent.
Ability to work swing shifts (Sunday–Thursday, 2 PM – 10 PM).
Strong technical aptitude, teamwork, curiosity, and persistence in solving complex security problems.
Preferred Qualifications
Bachelor’s Degree in Computer Science, Information Security, or related field (or equivalent experience).
Professional certifications such as
CompTIA Security+, CEH, GCIH, GCIA, or CISSP .
3–5+ years of experience in cybersecurity operations, SOC analysis, or threat intelligence.
Hands‑on experience with SIEM tools (e.g., Splunk, QRadar, Sentinel), EDR, IDS/IPS, and forensic tools.
Strong understanding of malware analysis, phishing detection, and incident response workflows.
Experience in energy, utility, or critical infrastructure environments is a plus.
Tools & Technologies (Preferred Exposure)
SIEM & EDR:
Splunk, CrowdStrike, Sentinel, QRadar
Threat Intelligence:
MISP, Recorded Future, Anomali
Why Join You’ll play a vital role in safeguarding California’s energy infrastructure, working with one of the most advanced monitoring and response teams in the industry. This is an opportunity to apply your expertise in a
mission‑critical environment
that directly impacts millions of customers.
Seniority Level Mid‑Senior level
Employment Type Contract
Job Function Information Technology
Industries Utilities, Information Services, and IT Services and IT Consulting
#J-18808-Ljbffr
Senior Cyber Security Threat Analyst / Specialist
to join the
Monitoring & Response (M&R) Team
— the first line of defense in detecting, analyzing, and responding to cyber threats. This team continuously monitors their enterprise environment, leveraging advanced tools, threat intelligence, and proactive hunting to identify and mitigate malicious activity.
This role requires a
hands‑on cybersecurity professional
with strong analytical, investigative, and problem‑solving skills, capable of operating in a high‑tempo environment to defend critical utility infrastructure.
Key Responsibilities
Monitor cybersecurity events and alerts to identify potential threats and determine malicious activity.
Analyze malware, phishing, and other security incidents; elevate and coordinate with Incident Response as needed.
Perform proactive
threat hunting
based on intelligence from utility peers, ISACs, and internal data sources.
Conduct forensic analysis to trace sources of anomalous or suspicious behavior across systems.
Support vulnerability management, firewall management, and related cybersecurity processes through continuous feedback and metrics.
Research emerging threats and apply findings to improve detection and response strategies.
Perform system administration and integration tasks for security tools to enhance automation and efficiency.
Contribute to the development of cybersecurity strategy and operational improvements within the department.
Qualifications
High School Diploma or GED equivalent.
Ability to work swing shifts (Sunday–Thursday, 2 PM – 10 PM).
Strong technical aptitude, teamwork, curiosity, and persistence in solving complex security problems.
Preferred Qualifications
Bachelor’s Degree in Computer Science, Information Security, or related field (or equivalent experience).
Professional certifications such as
CompTIA Security+, CEH, GCIH, GCIA, or CISSP .
3–5+ years of experience in cybersecurity operations, SOC analysis, or threat intelligence.
Hands‑on experience with SIEM tools (e.g., Splunk, QRadar, Sentinel), EDR, IDS/IPS, and forensic tools.
Strong understanding of malware analysis, phishing detection, and incident response workflows.
Experience in energy, utility, or critical infrastructure environments is a plus.
Tools & Technologies (Preferred Exposure)
SIEM & EDR:
Splunk, CrowdStrike, Sentinel, QRadar
Threat Intelligence:
MISP, Recorded Future, Anomali
Why Join You’ll play a vital role in safeguarding California’s energy infrastructure, working with one of the most advanced monitoring and response teams in the industry. This is an opportunity to apply your expertise in a
mission‑critical environment
that directly impacts millions of customers.
Seniority Level Mid‑Senior level
Employment Type Contract
Job Function Information Technology
Industries Utilities, Information Services, and IT Services and IT Consulting
#J-18808-Ljbffr