Senior Incident Response Analyst managing high-severity security incidents at Broadridge. Leading investigations and coordinating response efforts with cross-functional teams.
Responsibilities
Lead and coordinate response efforts for high-severity security incidents, including malware outbreaks, ransomware, data breaches, insider threats, and advanced persistent threats (APTs)
Perform in-depth incident investigation, containment, eradication, and recovery activities across endpoint, network, cloud, and identity platforms
Conduct advanced forensic analysis (endpoint, memory, log, and network) to determine root cause, scope, and impact
Develop and refine incident response playbooks, runbooks, and standard operating procedures
Serve as an escalation point and subject matter expert for junior and mid-level analysts
Mentor and coach junior analysts through hands-on guidance, case reviews, and knowledge sharing
Lead post-incident reviews and drive lessons learned into actionable improvements
Collaborate with SOC, Threat Intelligence, Vulnerability Management, Legal, and IT teams
Assist in tabletop exercises, incident simulations, and readiness assessments
Provide clear, concise communication to technical teams and non-technical stakeholders during incidents
Requirements
7–10 years of experience in cybersecurity, with significant hands-on experience in incident response or digital forensics
Strong understanding of attacker tactics, techniques, and procedures (TTPs), aligned with frameworks such as MITRE ATT&CK
Experience responding to real-world incidents in enterprise environments
Proficiency with SIEM, EDR/XDR, network security tools, and log analysis
Solid understanding of Windows, Linux, and cloud environments (AWS, Azure, or GCP)
Ability to remain calm and decisive under pressure during high-impact incidents
Prior experience in a formal SOC or IR team leadership or mentorship role
Excellent written and verbal communication skills
Good to have GIAC Certified Incident Handler (GCIH) or equivalent strongly desired
Additional certifications such as GCED, GCFA, GREM, CISSP, or similar
Experience with cloud incident response and SaaS platforms
Senior Associate in Cybersecurity at PwC, managing cybersecurity incidents and mentoring junior team members to deliver quality solutions. Collaborating with clients to protect sensitive data against cyber threats.
Analyst supporting Controls Testing and Data Repair in regulated financial services. Executing testing activities and maintaining governance artifacts for data repair events.
Incident and Problem Manager at SONDA focusing on prioritizing and managing incidents. Collaborating on root cause analysis and prioritizing user communication in a technology - driven environment.
Incident Manager coordinating critical incidents and technical solutions in a leading technology company. Documenting and managing changes to improve service quality and efficiency.
Engineer II in Cyber Incident Response responsible for detecting and responding to cybersecurity incidents. Collaborating with global teams to minimize business impact and strengthen detection capabilities.
Senior Cyber Incident Response Analyst managing cybersecurity incidents for clients. Focused on proactive threat hunting, incident response, and digital forensics in a hybrid environment.
Incident Response expert managing IT security incidents across teams in a global retail company. Focusing on advanced incident response and continual improvement in a dynamic work environment.
Digital Forensics & Incident Response Analyst providing real - time threat analysis and mitigation at Cayuse. Engaging in cybersecurity initiatives while leveraging extensive forensics experience.