Cyber Security Analyst Job at KBS - Kellermeyer Bergensons Services, LLC, Oceanside, CA

NW9UUmtvcUJBcmpmamdSTnBCNmNLSFhseFE9PQ==
  • KBS - Kellermeyer Bergensons Services, LLC
  • Oceanside, CA

Job Description

Kellermeyer Bergensons Services (KBS) is the largest privately held provider of facility services in North America, servicing over 2 billion square feet of space daily. We help industry leaders across a wide range of key verticals—including retail, industrial and logistics, healthcare, education, manufacturing, and more —maintain clean, efficient, and welcoming spaces that support their operations. As we continue to grow, we are looking for team members who are dedicated, reliable, and ready to contribute to a culture built on respect, opportunity, and pride in service.

We are seeking a Cyber Security Analyst to monitor, investigate, and responds to security threats across KBS and its subsidiaries’ networks, endpoints, and cloud environments. This role combines proactive threat hunting, analytics, and automation to detect, contain, and mitigate cyber risks. The analyst plays a key role in strengthening enterprise defenses, improving visibility, and supporting continuous improvement of the company’s overall security posture.

If this sounds like you, then why wait, APPLY TODAY!!

Salary Range: $90-100k

Essential Duties And Responsibilities

Responsibilities may include but are not limited to:

  • Actively hunt for indicators of compromise (IOCs), suspicious activities, and adversarial behavior across environments using CrowdStrike Falcon and other EDR/XDR platforms.
  • Develop and execute CQL queries and build dashboards to analyze telemetry from Microsoft Defender, CrowdStrike, and related tools.
  • Automate detection, log analysis, and incident response workflows using Python, PowerShell, and SOAR integrations.
  • Monitor environments, endpoints, networks, and cloud services for potential breaches, escalating or remediating as appropriate.
  • Work cross-functionally to investigate incidents, perform root-cause analysis, and implement corrective actions.
  • Collaborate to identify vulnerabilities; validate remediation and patch/configuration compliance to ensure issues are fully resolved.
  • Participate in red/blue team exercises, simulations, and post-incident reviews to identify and reduce areas of vulnerability/exposure and improve readiness.
  • Create and improve security baselines, detection rules, and playbooks to enhance threat visibility and reduce response time.
  • Prepare reports and documentation on incidents, improvements, and overall security posture.
  • Ensure alignment with internal policies, industry standards, and relevant security frameworks.
  • Continuously research and stay informed on emerging attack vectors, vulnerabilities, and adversary techniques to anticipate and mitigate evolving cyber threats.
  • Maintain a proactive, inquisitive, and analytical mindset, actively hunting for anomalies and threats that standard controls may overlook.

Knowledge, Skills And Competencies

  • Hands-on experience using CQL to build queries and dashboards is required
  • EDR/XDR, SIEM, SOAR platforms (CrowdStrike, Microsoft Defender, and similar)
  • Experience with Python or PowerShell scripting for automation and incident enrichment
  • Threat intelligence, vulnerability management, and incident response methodologies
  • Understanding of common threat frameworks (MITRE ATT&CK, Cyber Kill Chain)
  • Knowledge of cloud security operations across Microsoft 365, Azure, and AWS
  • Computer systems, hardware, networks, and modern cloud infrastructures.
  • Analytical and detail-oriented with strong problem-solving ability
  • Self-motivated and dependable, working effectively with minimal supervision
  • Collaborative communicator with cross-departmental awareness
  • Curious and proactive, committed to continuous learning and process improvement
  • Proactive threat hunter, identifying anomalies and emerging risks before escalation
  • Agile and adaptable, adjusting quickly to evolving priorities and threat landscapes

Educational Qualifications/Job Experience Requirements

  • 5+ years’ experience in the information security field
  • Bachelor's degree in a computer-related field, such as cybersecurity, software information assurance, computer science, or an educational equivalent
  • Certifications such as CISSP, GCIA, GCIH, or CrowdStrike Certified Falcon Responder (CCFR) preferred

Job Tags

Similar Jobs

State Utility Contractors

Dump Truck Driver (Tandem Axle) - CDL Required -Monroe/Wingate, NC Region Job at State Utility Contractors

 ...Position DescriptionJob Description: Tandem Axle DumpTruck Driver (Class A & Class B CDL)Company:State Utility Contractors, Inc., a leading employee-owned utility contractor inthe Southeast, is seeking full-time, skilled dump truck drivers with Class Aor Class... 

Ohana Outreach Financial

Customer Service Manager - REMOTE Job at Ohana Outreach Financial

 ...This remote management opportunity is built for professionals seeking growth without relocation. You will manage service operations, mentor team members, and drive consistent results. Bonuses are tied directly to leadership performance and team outcomes.... 

Valley Catholic High School

Varsity Football Coach Job at Valley Catholic High School

Valley Catholic School is seeking a Varsity Football Coach who is committed to educating student athletes from diverse backgrounds in a Catholic community; challenging each individual to live as a Catholic witness in service to others. Valley Catholic believes that the... 

MidWestern IT

Available Business Analyst Position Job at MidWestern IT

 ...Requirement: Business Analyst Location: Pennsylvania Experience: 0 3 Years Job Type: W2 Contract Job...  ...Description: We are seeking a motivated and detail-oriented Entry-Level Business Analyst to support business and IT stakeholders in... 

Covetus Technologies Pvt Ltd

SAP Master Data Governance (MDG) Job at Covetus Technologies Pvt Ltd

# Implement and configure SAP MDG modules for master data domains such as Material, Customer, Vendor, and Finance . # Analyze business requirements and design governance models, data models, and workflow processes. # Configure data models, change request types...