
Cybersecurity Analyst
A+E Networks
New York, NYThis was removed by the employer on 4/1/2026 12:37:00 PM PST
This is a Full Time Job
Work Locations: With the exception of some select roles that have in-office requirements, A+E Global Media operates on a flexible model that allows for remote, hybrid or full time in office work (in certain locales).
Office locations include New York City, Los Angeles, Chicago, and Stamford, CT.
Our list of eligible states in which employees may work remotely includes: California, Connecticut, Florida, Georgia, Illinois, Indiana, Maryland, Massachusetts, Michigan, Minnesota, Nevada, New Hampshire, New Jersey, New York, North Carolina, Oregon, South Carolina, South Dakota, Texas, West Virginia, Wisconsin, and Wyoming.
Job Description
THE ROLE: Cyber Security Analyst
Cybersecurity is part of the Global Technology and Media Operations (GTMO) organization and is responsible for protecting A+E's systems, data, and content across the company. The team works across corporate, consumer, and media supply chains.
This role sits within the Incident Management team and focuses on investigating and responding to security events across endpoint, identity, email, cloud, and network environments. The team uses a combination of internal capabilities and external partners to monitor and respond to threats.
The Cybersecurity Analyst partners with engineering and operational teams across the organization to investigate issues, contain threats, and improve how we detect and respond to security events.
MORE ABOUT WHAT YOU'LL DO:
• Respond to and investigate security alerts, events, and incidents in a timely manner
• Triage alerts and determine severity, scope, and potential impact
• Analyze activity across tools such as CrowdStrike, Microsoft Defender for O365, Zscaler, and Abnormal
• Support containment, remediation, and recovery actions during incidents
• Document findings, actions, and decisions in the ITSM platform and track incidents through closure
• Work with internal teams (Cloud, DevOps, Infrastructure, Client Services, AppSec) to investigate issues and execute containment and remediation actions
• Correlate data across multiple systems to validate threats and reduce false positives
• Identify gaps and contribute to improvements in detection, alerting, and response processes
BASIC REQUIREMENTS:
• Bachelor's degree in Computer Science, Information Technology, or equivalent experience is preferred
• 4+ years of experience in cybersecurity or information security, including at least 2 years in incident response or security investigations
• Hands-on experience analyzing and responding to security events, including log analysis, research, and coordinating across multiple tools and teams
• Experience with endpoint detection and response tools (e.g., CrowdStrike) and SIEM platforms
• Experience investigating alerts across endpoint, identity, email, or network environments
• Familiarity with tools such as Microsoft Defender for O365, Zscaler, or similar platforms
• Experience working in cloud environments (AWS, Azure, or similar)
• Strong analytical, problem-solving, and communication skills, with the ability to manage multiple tasks
THE IDEAL CANDIDATE WILL HAVE:
• Experience with AI phishing tools such as Abnormal Security or similar email security platforms
• Experience with identity and access management (e.g., Okta, Entra ID)
• Experience with vulnerability management tools (e.g., Qualys)
• Experience working with data pipeline or log management tools (e.g., Cribl)
• Experience with cloud security and incident response, especially in AWS
• Cybersecurity certifications (e.g., Security+, CySA+, GCIA, GCIH, or similar), especially in incident response, threat intelligence, or threat hunting
• Cloud certifications are a plus