Demo

Cybersecurity Analyst II

EXOS
EXOS Salary
Indianapolis, IN Full Time
POSTED ON 5/8/2026
AVAILABLE BEFORE 6/6/2026

What You Will Do:

(NO C2C)


The Cybersecurity Analyst II at EXOS CYBER is the escalation point for the SOC. You take the alerts and tickets that Tier 1 cannot fully resolve, drive them to a confident answer, and pass anything beyond standard playbooks to the Cybersecurity Engineers and Team Lead with a clear recommendation. You will support day-to-day security operations for our clients with a primary focus on security monitoring, detection, and incident response, working alongside senior security engineers and incident responders.

Beyond the queue, you play a deliberate role in assisting of maturing the SOC by writing and refining playbooks, tuning detections in coordination with our Senior Engineer / Purple Team and AI Automation Engineer, and mentoring Tier 1. This is a hands-on, high volume technical role designed for analysts with 3 to 6 years of experience who are ready to deepen their SOC skills while gaining broad exposure to a real world MSSP detection and response stack across diverse client environments.

  • Monitor and triage security alerts across multiple client environments using SIEM, EDR, email security, and cloud security tools. Validate and investigate common alert types, determine impact, and recommend or execute initial response actions based on runbooks.
  • Take ownership of escalated alerts and tickets, drive them through full investigation, and either resolve or escalate to engineering with a recommended action. Escalations to senior responders include accurate context, evidence, and timelines.
  • Run point on confirmed true positive incidents within scope, including containment via SentinelOne, account isolation in Entra ID, credential rotation guidance, evidence collection, post incident documentation, and client communication.
  • Analyze endpoint, identity, and network telemetry to identify suspicious activity, lateral movement, and persistence attempts.
  • Conduct phishing triage and support email-based threat investigations, including user impact assessment and remediation steps.
  • Partner with the Senior Engineers / Purple Team and AI Automation Engineer to identify noisy alerts, tune rules in the SIEM and EDR, and reduce false positive load through alert suppression and use case enhancements.
  • Execute scheduled hunts against client environments using SDL queries, EDR telemetry, and indicators from CTI feeds. Document findings and feed results back into detection engineering.
  • Support vulnerability scanning programs by helping interpret results, tracking remediation, and coordinating follow-ups with client IT teams.
  • Review escalations, give kind and direct feedback, run weekly walk-throughs of recent investigations, and contribute to Tier 1 onboarding curriculum.
  • Maintain thorough case notes, incident summaries, and client-ready communications in the ticketing system. Author the analytical narrative for monthly client reports covering what we saw, what it means, and what we recommend.


What You Have Done

3 years of experience in a SOC, incident response, MSSP, or security operations focused role or 2 years post-Tier 1 in a comparable role

  • Demonstrated investigation skills across endpoint, identity, email, and network telemetry.
  • Working command of an EDR (SentinelOne, CrowdStrike, or Defender for Endpoint) and a SIEM (Blumira, Sentinel, Splunk, or QRadar) at the query-and-pivot level.
  • Familiarity with common log sources such as Windows event logs, Active Directory, Azure AD or Entra ID, firewall, VPN, DNS, and email security logs.
  • Practical scripting in PowerShell and/or Python for investigation, log parsing, and lightweight automation.
  • Experience triaging phishing, malware, suspicious authentication activity, and policy or misconfiguration-driven alerts
  • Working knowledge of incident response lifecycle, escalation criteria, and evidence preservation
  • Ability to prioritize effectively in a multi-client environment and manage multiple active cases without losing quality
  • Strong documentation habits with the ability to produce clear, client-ready updates and incident summaries
  • Solid fundamentals in TCP/IP, DNS, HTTP/S, Windows and Linux concepts, and identity and access management
  • Experience with ticketing systems and meeting SLAs for response, escalation, and customer communication
  • Relevant certifications such as CompTIA Security , CySA , Microsoft security fundamentals, or equivalent experience preferred


Preferred Qualifications

  • Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or related discipline. Equivalent military training or certifications considered.
  • CompTIA CySA , GIAC GCIH, GIAC GCFA, GIAC GCDA, BTL2, or equivalent.
  • Prior MSSP experience, especially in a multi-tenant ticketing model (ConnectWise, Autotask, ServiceNow, etc.).
  • Familiarity with Sigma rules, KQL, or SentinelOne / Blumira query syntax.
  • Experience with SOAR or rules-based automation; comfort working alongside an AI Automation Engineer to operationalize playbooks.
  • Exposure to vulnerability management workflows (ConnectSecure, Tenable, Qualys, or similar) and pentesting output review (NodeZero or comparable).
  • Experience with MITRE ATT&CK Framework
  • Hands-on lab experience: TryHackMe, LetsDefend, Blue Team Labs, or home-lab portfolio.
  • Experience in proactive Cyber Threat Hunting activities

Salary.com Estimation for Cybersecurity Analyst II in Indianapolis, IN
$87,656 to $108,864
If your compensation planning software is too rigid to deploy winning incentive strategies, it’s time to find an adaptable solution. Compensation Planning
Enhance your organization's compensation strategy with salary data sets that HR and team managers can use to pay your staff right. Surveys & Data Sets

What is the career path for a Cybersecurity Analyst II?

Sign up to receive alerts about other jobs on the Cybersecurity Analyst II career path by checking the boxes next to the positions that interest you.
Income Estimation: 
$87,093 - $107,335
Income Estimation: 
$111,725 - $147,313
Income Estimation: 
$112,673 - $137,290
Income Estimation: 
$140,233 - $181,029
Income Estimation: 
$161,209 - $233,553
Income Estimation: 
$99,793 - $130,112
Income Estimation: 
$125,027 - $157,872
Employees: Get a Salary Increase
View Core, Job Family, and Industry Job Skills and Competency Data for more than 15,000 Job Titles Skills Library

Job openings at EXOS

  • EXOS Indianapolis, IN
  • What You Will Do The Cybersecurity Analyst at EXOS CYBER is the front line of our SOC, the first set of eyes on every alert that comes into our environment... more
  • 5 Days Ago

  • EXOS start, LA
  • Job Summary: Exos is seeking high performing individuals to take part in our learning intensive, 12-16 week internship program. This internship will be ons... more
  • 6 Days Ago

  • EXOS Indianapolis, IN
  • EXOS is a family of companies formerly known as Sondhi Solutions that provides cybersecurity, talent and IT solutions across the United States. The brand E... more
  • 6 Days Ago

  • EXOS Malvern, PA
  • Job Summary: Responsibilities: We're seeking a Referee to join our team. As a Referee you will: Officiate at sporting events, games, or competitions, to ma... more
  • 6 Days Ago


Not the job you're looking for? Here are some other Cybersecurity Analyst II jobs in the Indianapolis, IN area that may be a better fit.

  • GadellNet Consulting Services Indianapolis, IN
  • GadellNet Consulting Services is a rapidly growing IT company based in the Midwest, providing technological solutions to hundreds of businesses across vari... more
  • 22 Days Ago

  • Allied Solutions LLC Carmel, IN
  • The Cybersecurity Operations Analyst I is an entry level role within the Information Solutions Department responsible for detecting and assisting in the re... more
  • 1 Day Ago

AI Assistant is available now!

Feel free to start your new journey!