Cybersecurity Incident Response Analyst detecting and responding to cyber threats at NOV. Collaborating using AI tools to enhance cybersecurity operations across IT, cloud, and OT environments.
Responsibilities
Monitor, triage, and investigate alerts from SIEM, EDR, identity platforms, and cloud environments
Use AI/LLM-powered tools to enrich alerts, summarize logs, and support root cause analysis
Correlate telemetry across identity, endpoint, cloud, and network systems to build clear incident timelines
Support containment and remediation efforts in collaboration with SOC, engineering, and IT teams
Analyze AI-generated threat scores, behavioral anomalies, and recommendations to detect stealthy or emerging threats
Assist in evidence collection for forensics, insider threat, or audit-related investigations
Document incidents thoroughly and contribute to response playbooks and process improvements
Participate in tabletop exercises and threat simulation activities to improve detection and response maturity
Recommend enhancements to detection rules and automation workflows based on incident learnings
Other duties as assigned by organization leadership
Requirements
Possess strong communications and interpersonal skills in English
Self-directed, organized, and able to manage multiple priorities
Strong ability to work collaboratively with others, to influence based on knowledge and experience
Experience in a SOC, cybersecurity operations, or incident response role
Hands-on experience with tools like SentinelOne, Defender for Endpoint, Microsoft Sentinel, Zscaler, or Splunk
Familiarity with MITRE ATT&CK and common attacker tactics, techniques, and procedures
Working knowledge of endpoint behavior, log analysis, DNS/HTTP/SOC telemetry, and identity-related indicators
Basic scripting or automation (PowerShell, Python, Bash) to assist in triage or data parsing
Experience using or interpreting AI/ML-driven detection tools, or LLM-based security assistants (e.g., for alert summaries or ticket generation)
Strong communication and documentation skills for technical and non-technical audiences
Calm under pressure and effective in active response situations
Security Engineer enhancing cybersecurity tools and solutions for The Walt Disney Company. Performing system analyses and developing security configurations for improved protection against cyber threats.
Security Operations Lead responsible for security operations aligning with policies and compliance. Handling incident response, vulnerability management, and supporting IT teams with security expertise.
Cyber Security Specialist protecting digital estate from threats at the University of Edinburgh. Focused on identifying and mitigating cyber risks while supporting teaching and research services.
Lead Specialist in Security Operations, enhancing detection engineering and incident response at Pearson. Collaborate with teams and drive process improvements in a high - paced environment.
Security Engineer II at AvidXchange enhancing security operations and incident response. Collaborating with teams to develop, tune and improve security monitoring and automation capabilities.
Director leading security operations strategy and overseeing investigations at Ford Motor Company. Responsible for global investigations, crisis management, and team leadership.
Lead global Cyber Detect and Respond team at Assa Abloy, ensuring timely incident response and security compliance. Oversee operations while collaborating across IT and business functions for effective threat management.
Lead Cybersecurity Analyst responsible for technical leadership of a 24x7 SOC team at AT&T. Drive operational standards, incident response, and continuous improvement initiatives.