Analyst1 - Washington, DC

posted 6 days ago

Full-time - Mid Level
Washington, DC

About the position

The Technical Account Manager (TAM) at Analyst1 plays a crucial role in embedding with assigned customers to foster understanding, relationships, and support, ensuring that Analyst1 becomes an integral part of their security operations. The TAM will leverage their expertise in the Analyst1 platform to guide operational user communities, helping them achieve their unique security goals while enhancing their defensive capabilities and efficiencies.

Responsibilities

  • Gain a complete understanding of Analyst1's role in ideal and current customer operations.
  • Work with customers to ensure they are leveraging the product and achieving success.
  • Derive and disseminate best practices that help drive customer adoption of Analyst1.
  • Take responsibility for a customer's adoption, renewal, and expansion of software's use and licenses sold.
  • Understand the daily workings of small to large cyber teams and the organizational complexities of many teams using Analyst1 together.
  • Provide strategies for adoption and training of end users to ensure retention.
  • Develop support documentation, including training and user guides.
  • Provide product feedback to product team based on customer experiences.

Requirements

  • TS Clearance with the ability to get SCI Clearance.
  • Experience as an analyst in the Department of Defense (DoD), Federal Government, or their agencies, especially the Cybersecurity & Infrastructure Security Agency (CISA).
  • Experience with cyber intelligence, cyber automation, or cyber defense roles & industry.
  • Strong technical background and ability to speak to engineers and end users as a former 'person in the chair'.
  • Strong troubleshooting, presentation, and consultative skills.
  • Comfortable speaking technically with analysts and strategically with senior executives.
  • Strong verbal and written communication skills, including communicating directly with clients.
  • BA/BS or equivalent combination of education and experience.

Nice-to-haves

  • Experience producing or using cyber threat intelligence.
  • Experience working with ITSM/ticketing solutions.
  • Experience supporting SOC operations.
  • Experience working with and/or configuring SIEM/Log Manager tools (e.g. Splunk, ELK, Exabeam, Devo).
  • Experience authoring signatures (aka rules/alerts) to aid in malicious activity detection (including but not limited to SNORT, YARA, SURICATA).
  • Experience illustrating malicious activity trends based on triaged/vetted malicious network activity.
  • Background as government civilian or contractor.
  • Current or past DHS suitability or DoD clearance.

Benefits

  • Competitive salary + Bonus
  • Fully Funded medical, dental, and vision coverage options
  • Remote-First Culture
  • Flexible Time Off Policy
  • 401k
  • Life Insurance
  • Pet Insurance
  • Pre-Paid Legal Aid Options
  • Week off from Christmas through New Year's Day
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service