Cyber Security Analyst
Company: Kellermeyer
Location: Oceanside
Posted on: January 15, 2026
|
|
|
Job Description:
About KBS Kellermeyer Bergensons Services (KBS) is the largest
privately held provider of facility services in North America,
servicing over 2 billion square feet of space daily . We help
industry leaders across a wide range of key verticals—including
retail, industrial and logistics, healthcare, education,
manufacturing, and more —maintain clean, efficient and welcoming
spaces that support their operations. As we continue to grow, we’re
looking for team members who are dedicated, reliable, and ready to
contribute to a culture built on respect, opportunity, and pride in
service. Position Summary The Cyber Security Analyst monitors,
investigates, and responds to security threats across KBS and its
subsidiaries’ networks, endpoints, and cloud environments. This
role combines proactive threat hunting, analytics, and automation
to detect, contain, and mitigate cyber risks. The analyst plays a
key role in strengthening enterprise defenses, improving
visibility, and supporting continuous improvement of the company’s
overall security posture. LOCATION - THIS ROLE IS 100% REMOTE
CANDIDATE MUST LIVE ON THE WEST COAST SALARY RANGE - $100-120k
Duties and Responsibilities Actively hunt for indicators of
compromise (IOCs), suspicious activities, and adversarial behavior
across environments using CrowdStrike Falcon and other EDR/XDR
platforms. Develop and execute KQL queries and build dashboards to
analyze telemetry from Microsoft Defender, CrowdStrike, and related
tools. Automate detection, log analysis, and incident response
workflows using Python, PowerShell, and SOAR integrations. Monitor
environments, endpoints, networks, and cloud services for potential
breaches, escalating or remediating as appropriate. Work
cross-functionally to investigate incidents, perform root-cause
analysis, and implement corrective actions. Collaborate to identify
vulnerabilities; validate remediation and patch/configuration
compliance to ensure issues are fully resolved. Participate in
red/blue team exercises, simulations, and post-incident reviews to
identify and reduce areas of vulnerability/exposure and improve
readiness. Create and improve security baselines, detection rules,
and playbooks to enhance threat visibility and reduce response
time. Prepare reports and documentation on incidents, improvements,
and overall security posture. Ensure alignment with internal
policies, industry standards, and relevant security frameworks.
Continuously research and stay informed on emerging attack vectors,
vulnerabilities, and adversary techniques to anticipate and
mitigate evolving cyber threats. Maintain a proactive, inquisitive,
and analytical mindset, actively hunting for anomalies and threats
that standard controls may overlook. Requirements Hands-on
experience using KQL to build queries and dashboards is required
EDR/XDR, SIEM, SOAR platforms (CrowdStrike, Microsoft Defender, and
similar) Experience with Python or PowerShell scripting for
automation and incident enrichment Threat intelligence,
vulnerability management, and incident response methodologies
Understanding of common threat frameworks (MITRE ATT&CK, Cyber
Kill Chain) Knowledge of cloud security operations across Microsoft
365, Azure, and AWS Computer systems, hardware, networks, and
modern cloud infrastructures. Analytical and detail-oriented with
strong problem-solving ability Self-motivated and dependable,
working effectively with minimal supervision Collaborative
communicator with cross-departmental awareness Curious and
proactive, committed to continuous learning and process improvement
Proactive threat hunter, identifying anomalies and emerging risks
before escalation Agile and adaptable, adjusting quickly to
evolving priorities and threat landscapes Experience Required: 5
years’ experience in the information security field Education:
Bachelor's degree in a computer-related field, such as
cybersecurity, software information assurance, computer science, or
an educational equivalent Certifications such as CISSP, GCIA, GCIH,
or CrowdStrike Certified Falcon Responder (CCFR) preferred
Full-time Benefits: As a full-time KBS employee (30 hours per week)
you may qualify for benefits including medical, dental, vision,
prescription drugs, and more! Paid Time Off Paid Holidays Sick Time
Life Insurance Short Term Disability – Employer paid Long Term
Disability Supplemental Health Insurance (E.G., Accident) 401k plan
with a match or Non-qualified Deferred Compensation Plan Pet
Insurance PerkSpot Discount Program – discounts on travel, gyms,
cell phones, restaurants, auto, apparel & electronics KBS considers
all applicants for employment without regard to race, color,
religion, gender, sexual orientation, national origin, age,
disability, gender identity, and expression, marital or military
status, or based on an individual's status in any group or class
protected by applicable federal, state, or local law. KBS also
provides reasonable accommodations to qualified individuals with
disabilities in accordance with the Americans with Disabilities Act
and applicable state and local law.
Keywords: Kellermeyer, Whittier , Cyber Security Analyst, IT / Software / Systems , Oceanside, California