cover image
NuHarbor Security

NuHarbor Security

www.nuharborsecurity.com

2 Jobs

121 Employees

About the Company

NuHarbor Security is a leading national cybersecurity services firm, supporting the diverse needs of hundreds of clients with clear, comprehensive, and outcome-based solutions. We support only best-of-breed security technologies with thoroughly trained and vetted analysts. We make cybersecurity easier for our clients by integrating the most comprehensive set of security services in the market, from compliance and offensive testing to award-winning 24/7 managed security operations. What's more, NuHarbor advisors analyze information from multiple sources to deliver the most well-informed strategies for building, improving, and maintaining your cybersecurity program. NuHarbor makes it easy to secure what matters most to you.

Listed Jobs

Company background Company brand
Company Name
NuHarbor Security
Job Title
Security Analyst
Job Description
Job title: Security Analyst Role Summary: Monitor and analyze client environments for security incidents, escalate events, and provide actionable intelligence to mitigate risks. Conduct threat hunting, vulnerability assessments, and improve security processes to enhance client protection. Expectations: Deliver timely incident escalations; maintain threat intelligence platforms; generate reports on schedule; improve operational efficiency and documentation. Key Responsibilities: - Analyze security alerts, events, and trends to communicate the value of security solutions; - Conduct autonomous investigations and escalate actionable findings to clients and stakeholders; - Perform vulnerability scan analysis and interpret results for gap identification; - Execute threat hunting in client environments to proactively detect risks; - Maintain threat intelligence platforms and develop mitigation strategies; - Document processes and improve operational procedures; - Research emerging threats and industry trends to inform security recommendations. Required Skills: - Proficiency in SOC operations, security event triage, and incident response; - Experience with SIEM (Splunk Enterprise Security), EDR (CrowdStrike Falcon), and security orchestration tools (e.g., Microsoft Sentinel); - Scripting skills for automation (e.g., Python, PowerShell); - Understanding of endpoint security, threat analysis, and incident response frameworks. Required Education & Certifications: - Bachelor’s degree in cybersecurity or related field plus 2+ years in cybersecurity with relevant industry certifications (e.g., CEH, CISSP); - Or 2+ years in technology field with comparable certifications; - U.S. citizenship.
Burlington, United states
Remote
Junior
05-02-2026
Company background Company brand
Company Name
NuHarbor Security
Job Title
Security Analyst, MDR
Job Description
**Job title** Security Analyst, MDR **Role Summary** Execute and manage second‑line defense and incident response for client environments using Microsoft Sentinel and CrowdStrike. Analyze alerts, conduct investigations to closure, document findings, and recommend mitigation strategies to enhance client security posture. **Expectations** - Deliver accurate, timely incident reports and quarterly SOC analytics. - Participate in client satisfaction calls and quarterly meetings as an SOC representative. - Maintain up‑to‑date industry knowledge, certifications, and SOC processes. - Communicate technical findings to both technical and non‑technical stakeholders. - Identify and convey internal and client risk exposures proactively. **Key Responsibilities** - Review, triage and resolve alerts from Microsoft Sentinel and CrowdStrike. - Conduct full incident lifecycle activities: detection, containment, eradication, recovery, and post‑incident lessons. - Tune SIEM queries and alert thresholds to reduce noise and improve detection accuracy. - Document all investigations, actions, and recommendations in standard operating procedures. - Collaborate with SOC lead to develop and improve SOPs, playbooks, and reporting templates. - Present findings and recommendations to clients via meetings, reports, and written communications. - Monitor security events and trends, producing actionable insights and trend analyses. - Participate in ongoing threat intelligence research to keep response tactics current. - Perform risk assessments and suggest control enhancements for client infrastructure. **Required Skills** - 5+ years of cybersecurity experience (or equivalent experience with 2+ years in a related tech field). - Proficiency with SIEM tools (Microsoft Sentinel/Defender) and endpoint detection (CrowdStrike). - Experience with Incident Response phases, threat hunting, and forensic analysis. - Strong command of Windows and Linux operating systems and common network services. - Ability to construct and explain hardening techniques, detection logic, and security controls. - Excellent verbal and written communication across technical and business audiences. - Methodical approach to documentation, process improvement, and multi‑tasking. **Required Education & Certifications** - Bachelor’s degree in Computer Science, Information Security, or related field *or* - 2 years of relevant technology experience with valid industry certifications. - Minimum of one CrowdStrike certification: CCFR, CCFA, or CCFH. - Preferred additional certifications: CEH, CISSP, GCFA, GCIH, Azure AZ‑500/700/305. ---
Burlington, United states
On site
Junior
02-03-2026