Job Description
This is a remote position.
Our client is seeking an experienced Senior Incident Response Analyst. This is a remote position with some on-call support.
Key Responsibilities
Resolves security incidents, recommending enhancements to improve security, identifying common attack patterns to publicly exposed aspects of the organization's environment, and contributing to the implementation of scalable and preventative security measures. Executes the enterprise-wide Incident Response Plan. Partners with business units to accomplish enterprise-wide remediation and develops and delivers presentations to the senior leadership team.
- Reviews current configurations, production information systems, and networks against compliance standards
- Prepares for the prevention and resolution of security breaches and ensures incident and response management processes are initiated
- Implements and discusses security service audit schedules, reviews access authorization, and performs the required access controls testing to identify security shortfalls
- Designs of automated scripts, contingency plans, and other programmed responses that are launched when an attack against systems has been detected
- Collaborates with Information Security Architects, Information Security Engineers, and software or hardware stakeholders
- Notifies internal and / or external teams according to agreed alert priority levels, escalation trees, triaging of security alerts, events, and notifications
- Ties third-party attack monitoring services and threat reporting services into internal CIRT (Cyber Incident Response Team) communications systems
- Performs post-mortem analysis with logs, network traffic flows, and other recorded information to identify intrusions by unauthorized parties, as well as unauthorized activities of authorized users
- Performs other duties as assigned
- Complies with all policies and standards
Requirements
Education / Experience :
Bachelor's degree in a quantitative or business field (e.g., statistics, mathematics, engineering, computer science).
Requires 4 – 6 years of related experience.
Equivalent experience acquired through accomplishments of applicable knowledge, duties, scope, and skill reflective of the level of this position.
Technical Skills :
4-6 years of Cloud cybersecurity experience performing incident triage and responseIntermediate-to-advanced understanding of AWS and Azure environment sKnowledge of tools, techniques, and processes (TTP) used by threat actorsKnowledge of Indicators of compromise (IOC)Knowledge of Wiz & Wiz DefendExperience with Endpoint protection and enterprise detection & response software (such as CrowdStrike, MS Defender, etc.)Knowledge of Network and infrastructure technologies, including routers, switches, firewalls, etc.Soft Skills :
Intermediate - Seeks to acquire knowledge in the area of specialtyIntermediate - Ability to identify basic problems and procedural irregularities, collect data, establish facts, and draw valid conclusionsIntermediate - Ability to work independentlyIntermediate - Demonstrated analytical skillsIntermediate - Demonstrated project management skillsIntermediate - Demonstrates a high level of accuracy, even under pressureIntermediate - Demonstrates excellent judgment and decision-making skillsLicense / Certification :
SANS GIAC Security Essentials (GSEC), SANS GIAC Certified Intrusion Analyst (GCIA) or equivalent, SANS GIAC Certified Incident Handler (GCIH) or equivalent preferredBenefits
Competitive pay, health insurance, 401K and stock purchase plans, tuition reimbursement, paid time off plus holidays, and a flexible approach to work with remote, hybrid, field, or office work schedules.
Requirements
Incident Response Experience AWS and Azure