Lead Cybersecurity Operations Analyst
Cyber Focus AI
Job Overview
Who's the hiring manager?
Sign up to PitchMeAI to discover the hiring manager's details for this job. We will also write them an intro email for you.

Job Description
About Cyber Focus AI and DICK'S Sporting Goods
Cyber Focus AI's mission is to help cybersecurity professionals discover cutting-edge opportunities in their field. We are not a staffing firm or agency. Cyber Focus AI does not hire for these roles—we use advanced technology to locate and verify them from actual employers.
At DICK'S Sporting Goods, we believe in how positively sports can change lives. On our team, everyone plays a critical role in creating confidence and excitement by personally equipping all athletes to achieve their dreams. We are committed to creating an inclusive and diverse workforce, reflecting the communities we serve. If you are ready to make a difference as part of the world's greatest sports team, apply to join our team today!
Overview: Lead Cybersecurity Operations Analyst
The Lead Cybersecurity Operations Analyst will serve as a hands-on leader and subject matter expert for cybersecurity operations. This role involves guiding complex security monitoring activities, leading incident investigations, and using multi-source data to identify risks and recommend improvements that strengthen the enterprise's security posture. You will drive meaningful operational enhancements, mentor analysts, and help shape the future of DICK'S Sporting Goods' detection and response capabilities.
Key Responsibilities
- Lead security incident investigations, ensuring timely containment, root cause analysis, and cross-team collaboration.
- Provide expert guidance on SIEM strategy, detection logic, and associated security technologies (EDR, email/web gateways, cloud controls).
- Standardize and refine monitoring workflows to improve signal quality, reduce false positives, and expand visibility across the environment.
- Leverage data from diverse sources (logs, telemetry, threat intel, case history) to identify patterns, emerging issues, and potential business impacts.
- Develop, drive, and execute recommendations—technical or professional—that shape both short-term defensive actions and longer-term operational strategy.
- Boost SOC effectiveness by implementing new tools, automation, AI-powered processes, and optimized playbooks supported by clear performance metrics.
- Anticipate what's next by actively monitoring emerging threats and regulatory changes that affect the company.
- Mentor and elevate teammates by sharing expertise, modeling strong communication under pressure, and supporting a culture of learning within the SOC.
- Collaborate closely with Technology teams, Legal/Privacy, Risk & Compliance, vendors, and third-party service providers.
- Act as a subject matter expert for technology, policy, and regulatory topics in your area.
- Maintain relevant professional certifications and stay current through conferences and ongoing professional development.
- Advise peers and leadership on emerging risks, best practices, and operational implications.
Preferred Skills & Experience
- Security & Incident Event Management (SIEM)
- Endpoint Detection & Response (EDR)
- Secure email gateways
- Query-building
- Detection Engineering
- Threat Hunting
- Experience with MITRE ATT&CK mapping and detection engineering workflows.
- Cloud and identity investigation experience (e.g. identity compromise and bypass techniques).
- Exposure to SOAR automation, playbook development, or case management platforms.
- Data pipeline and storage expertise (e.g. event and log data parsing)
- Security+ (preferred, not required)
- CISSP (preferred, not required)
- GIAC (preferred, not required)
- Vendor certifications (preferred, not required)
- Excellent written & Verbal Communication Skills
- Business acumen
- Customer-service oriented
- Strong interpersonal & client consultation skills
- Self-motivated & results oriented
- Strong presentation skills
- Problem solving & troubleshooting capabilities
- Supervisory & leadership capabilities
- Execution skills
- Project management knowledge
- Ability to drive projects & manage project teams
- Ability to work effectively in a team environment
- In-depth analytical skills
- Strong detail orientation
- Superior organizational abilities
- Process & procedure oriented
Qualifications
- Bachelor's Degree in Computer science, management information systems, cybersecurity, or equivalent experience
- 7-10 years experience in Security Operations, incident response, Windows, Linux, cloud, SIEM, EDR, firewalls, email gateways
Key skills/competency
- Cybersecurity Operations
- Incident Response
- SIEM
- EDR
- Threat Hunting
- Detection Engineering
- Cloud Security
- SOAR Automation
- Leadership
- Risk Management
How to Get Hired at Cyber Focus AI
- Research DICK'S Sporting Goods' culture: Study their mission, values, recent news, and employee testimonials on LinkedIn and Glassdoor.
- Tailor your resume for cybersecurity leadership: Highlight 7-10 years of experience in security operations, incident response, and SIEM technologies.
- Showcase your expertise: Emphasize practical experience with EDR, threat hunting, MITRE ATT&CK, and cloud security investigations.
- Prepare for technical and behavioral interviews: Be ready to discuss complex incident investigations, SOC improvements, and your leadership style.
- Demonstrate passion for sports and security: Connect your professional skills to the company's commitment to equipping athletes and securing their operations.
Frequently Asked Questions
Find answers to common questions about this job opportunity
Explore similar opportunities that match your background