Tier 2 Incident Response Analyst analyzing security alerts and ensuring prompt cybersecurity incident responses. Collaborating with SOC team to enhance cybersecurity practices.
Responsibilities
Utilize security tools to analyze, investigate, and triage security alerts
Monitor our customers environments, including cloud and SaaS solutions for evidence of adversarial activity
Perform in-depth analysis and investigation of high-priority cybersecurity incidents
Utilize advanced tools, such as host based digital forensics or malware analysis capabilities, to identify incidents’ root causes, scope, and impact
Collaborate with cyber threat hunting and cyber threat intelligence teams
Participate in the development, implementation, and tuning of the SOC tools detection content and alerting signatures.
Accurately document triage findings, and intake reports of external cybersecurity events from SOC customers via phone or email in the SOCs Incident Management System(IMS)
Learn new open and closed-source investigative techniques
Perform research into emerging threats and vulnerabilities to aid their prevention and mitigation
Help shape the evolution of processes and procedures of the SOC
Provide guidance and mentorship to Tier 1 SOC Analysts to enhance their skills and capabilities
Requirements
Minimum of six (6) years of cybersecurity experience
At least three (3) years in a SOC watch floor analyst or IR role
Bachelor’s Degree or higher in Cybersecurity or related is preferred
CISSP or CEH certification; additional experience, formal training, certifications, and/or education may be substitutable at the client's discretion
Experience in some of the following tools and technologies :i.e. SIEM experience required with Sumo Logic/Splunk preferred.
Knowledge of common attacker tools, techniques and procedures (TTP)
Experience with major cloud service provider offerings
Knowledge of malware
Knowledge of enterprise architecture including zero trust principles
Knowledge of Windows and Unix operating systems
Knowledge of common phishing techniques and how to investigate them
Proficiency in technical writing
Able to accurately and succinctly convey information through speaking, email, and presentations
Comfortable in customer facing environments
Ability to maintain a positive customer service mentality.
Benefits
Health/Dental/Vision
401(k) match
Paid Time Off
STD/LTD/Life Insurance
Referral Bonuses
Professional development reimbursement
Parental leave
Job title
Part Time Tier 2 Incident Response Analyst – Weekend Nights
Senior Associate in Cybersecurity at PwC, managing cybersecurity incidents and mentoring junior team members to deliver quality solutions. Collaborating with clients to protect sensitive data against cyber threats.
Analyst supporting Controls Testing and Data Repair in regulated financial services. Executing testing activities and maintaining governance artifacts for data repair events.
Incident and Problem Manager at SONDA focusing on prioritizing and managing incidents. Collaborating on root cause analysis and prioritizing user communication in a technology - driven environment.
Incident Manager coordinating critical incidents and technical solutions in a leading technology company. Documenting and managing changes to improve service quality and efficiency.
Engineer II in Cyber Incident Response responsible for detecting and responding to cybersecurity incidents. Collaborating with global teams to minimize business impact and strengthen detection capabilities.
Senior Cyber Incident Response Analyst managing cybersecurity incidents for clients. Focused on proactive threat hunting, incident response, and digital forensics in a hybrid environment.
Incident Response expert managing IT security incidents across teams in a global retail company. Focusing on advanced incident response and continual improvement in a dynamic work environment.
Digital Forensics & Incident Response Analyst providing real - time threat analysis and mitigation at Cayuse. Engaging in cybersecurity initiatives while leveraging extensive forensics experience.
Incident Response Analyst managing complex security incidents and leading response teams at Vanguard. Develop and implement incident action plans for security breaches and vulnerabilities.
Cyber Incident Response Analyst supporting 24/7 cybersecurity incident management and response operations for client. Engaging in case management, triage, and operational coordination activities.