Job Description
Title: Senior Incident Response Analyst (Temp-to-Perm). Highly prefer EST or Central Time Zone: β’ Relevant GIAC certifications such as GCIH, GSEC, GCIA, or GCFE. β’ Experience in capture-the-flag competitions or similar hands-on skills development. We are seeking a highly experienced Incident Response Analyst for a temp-to-perm opportunity supporting enterprise-level cyber defense operations. The ideal candidate has deep experience in incident response, cybersecurity analysis, and threat detection across complex environments. Responsibilities: β’ Support the identification, containment, eradication, and recovery of sophisticated level 2 and level 3 security incidents. β’ Provide technical guidance to cyber defense teams and assist in the resolution of complex incidents. β’ Analyze host logs, network traffic logs, firewall data, IDS/IPS alerts, and other telemetry to identify threats and vulnerabilities. β’ Coordinate incident response activities across internal IT teams, MSSPs, third-party vendors, and business units. β’ Perform incident triage including determining scope, urgency, and potential business impact. β’ Track and document incidents from detection through final resolution. β’ Collect and analyze intrusion artifacts, including malware samples and suspicious files. β’ Maintain and update incident management and ticketing systems with accurate and timely information. β’ Recommend short- and long-term improvements to security controls and IR processes. β’ Collaborate with intelligence analysts to correlate threat data and enhance detection capabilities. β’ Contribute to the development and maintenance of incident response procedures and playbooks. β’ Produce clear reports, guidance, and after-action summaries for stakeholders. β’ Conduct trend analysis on incidents and recurring threat activity. Required Experience: β’ 8+ years in a cyber defense, incident response, or cybersecurity analyst role, or a bachelorβs degree with 4+ years of relevant experience. β’ Strong experience leading or supporting IR for medium to high-complexity incidents. β’ Expert-level proficiency with EDR platforms. β’ Hands-on experience with Splunk, correlation searches, and enterprise security monitoring. β’ Familiarity with ESAs, open-source malware analysis tools, and sandboxing technologies. β’ Strong understanding of network fundamentals, threat vectors, and the full incident lifecycle. β’ Ability to handle multiple incidents simultaneously while maintaining accurate documentation. Preferred Qualifications: β’ Relevant GIAC certifications such as GCIH, GSEC, GCIA, or GCFE. β’ Experience in capture-the-flag competitions or similar hands-on skills development. Compensation: β’ Salary for the permanent position is targeted at approximately $140,000 annually, depending on experience. Apply tot his job
Ready to Apply?
Don't miss out on this amazing opportunity!
π
Apply Now