Senior Cyber Incident Response (IR) Analyst

🌍 Remote, USA 🎯 Full-time πŸ• Posted Recently

Job Description

Title: Senior Incident Response Analyst (Temp-to-Perm). Highly prefer EST or Central Time Zone: β€’ Relevant GIAC certifications such as GCIH, GSEC, GCIA, or GCFE. β€’ Experience in capture-the-flag competitions or similar hands-on skills development. We are seeking a highly experienced Incident Response Analyst for a temp-to-perm opportunity supporting enterprise-level cyber defense operations. The ideal candidate has deep experience in incident response, cybersecurity analysis, and threat detection across complex environments. Responsibilities: β€’ Support the identification, containment, eradication, and recovery of sophisticated level 2 and level 3 security incidents. β€’ Provide technical guidance to cyber defense teams and assist in the resolution of complex incidents. β€’ Analyze host logs, network traffic logs, firewall data, IDS/IPS alerts, and other telemetry to identify threats and vulnerabilities. β€’ Coordinate incident response activities across internal IT teams, MSSPs, third-party vendors, and business units. β€’ Perform incident triage including determining scope, urgency, and potential business impact. β€’ Track and document incidents from detection through final resolution. β€’ Collect and analyze intrusion artifacts, including malware samples and suspicious files. β€’ Maintain and update incident management and ticketing systems with accurate and timely information. β€’ Recommend short- and long-term improvements to security controls and IR processes. β€’ Collaborate with intelligence analysts to correlate threat data and enhance detection capabilities. β€’ Contribute to the development and maintenance of incident response procedures and playbooks. β€’ Produce clear reports, guidance, and after-action summaries for stakeholders. β€’ Conduct trend analysis on incidents and recurring threat activity. Required Experience: β€’ 8+ years in a cyber defense, incident response, or cybersecurity analyst role, or a bachelor’s degree with 4+ years of relevant experience. β€’ Strong experience leading or supporting IR for medium to high-complexity incidents. β€’ Expert-level proficiency with EDR platforms. β€’ Hands-on experience with Splunk, correlation searches, and enterprise security monitoring. β€’ Familiarity with ESAs, open-source malware analysis tools, and sandboxing technologies. β€’ Strong understanding of network fundamentals, threat vectors, and the full incident lifecycle. β€’ Ability to handle multiple incidents simultaneously while maintaining accurate documentation. Preferred Qualifications: β€’ Relevant GIAC certifications such as GCIH, GSEC, GCIA, or GCFE. β€’ Experience in capture-the-flag competitions or similar hands-on skills development. Compensation: β€’ Salary for the permanent position is targeted at approximately $140,000 annually, depending on experience. Apply tot his job

Ready to Apply?

Don't miss out on this amazing opportunity!

πŸš€ Apply Now

Similar Jobs

Recent Jobs

You May Also Like