Job Description:
SynthWeb is looking for a Cybersecurity Data Scientist / Security Analytics Engineer who
can combine data analytics, data science, and AWS cloud expertise to strengthen our
cybersecurity intelligence, threat detection, and risk analytics capabilities.
This role focuses on analyzing large-scale security data, building scalable cloud-based
analytics solutions, and enabling data-driven security decision-making across SynthWeb’s
cybersecurity initiatives.
Why Join SynthWeb?
- Work on advanced cybersecurity analytics and data-driven security solutions
- Combine data science, analytics, and cloud security in a single role
- High ownership and learning opportunities in a growing tech company
- Opportunity to build scalable security intelligence systems from the ground up
Nice to Have
- Experience with SIEM tools (Splunk, QRadar, Sentinel, Elastic)
- Exposure to SOAR platforms
- Security or cloud certifications (AWS Security, CEH, Security+, GCIA, GCIH)
Responsibilities:
- Analyze large volumes of security logs, alerts, and event data from SIEM, SOC,
firewalls, IDS/IPS, and endpoint tools - Identify anomalies, attack patterns, trends, and indicators of compromise (IOCs)
- Develop dashboards and reports for threat monitoring, incident analysis, and risk
visibility - Support security and engineering teams with actionable insights
2. Data Science & Security Intelligence
- Design and build statistical, ML, or rule-based models for anomaly detection, threat
prediction, and risk scoring - Apply data science techniques to behavioral analytics, fraud detection, and security
event correlation - Improve detection accuracy and reduce false positives through continuous model
refinement - Support threat intelligence enrichment and correlation efforts
3. AWS Cloud & Security Analytics
- Design, deploy, and manage AWS-based data and analytics platforms for
cybersecurity use cases - Work with services such as S3, EC2, Lambda, Glue, Athena, Redshift, Kinesis,
CloudWatch, GuardDuty, Security Hub, CloudTrail, and IAM - Ensure scalability, performance, security, and cost optimization
- Follow AWS cloud security best practices
- Build and maintain secure ETL/ELT pipelines for ingesting and transforming security
data - Integrate data from multiple sources including cloud platforms, APIs, and security
tools - Ensure data quality, normalization, retention, and availability
5. Reporting, Visualization & Insights
- Create dashboards and visualizations using tools such as QuickSight, Power BI,
Tableau, or Grafana - Translate complex security data into clear insights for technical and non-technical
stakeholders - Deliver regular reports on security posture, threat trends, and risk metrics
- Support incident response, investigations, and threat-hunting activities using
analytics-driven insights - Assist in root cause analysis and security event prioritization
- Continuously improve detection logic and analytics workflows
7. Compliance, Governance & Best Practices
- Ensure analytics workflows align with security standards and compliance
requirements (ISO 27001, SOC 2, GDPR, etc.) - Implement secure access controls, encryption, logging, and monitoring
- Document architectures, data flows, models, and processes
8. Cross-Functional Collaboration & Ownership
- Collaborate with security, cloud, engineering, and product teams
- Take ownership of analytics outcomes and continuous improvement initiatives
- Stay updated on emerging cyber threats, attack techniques, and security analytics
trends
Preferred Qualifications:
- Strong understanding of SOC operations, SIEM, incident response, threat
intelligence, and vulnerability management - Familiarity with frameworks such as MITRE ATTACK
- Strong proficiency in Python and SQL
- Experience with data analysis and ML libraries (Pandas, NumPy, Scikit-learn)
- Experience with anomaly detection, classification, clustering, or time-series analysis
AWS & Cloud
- Hands-on experience with AWS cloud services
- Knowledge of AWS security services (GuardDuty, Security Hub, CloudTrail, IAM)
- Understanding of cloud-native security architectures
