The Incident Response Analyst will provide detection, containment, and analysis of security events to protect the confidentiality, integrity, and availability of information systems in accordance with the firms business objectives, regulatory requirements, and strategic goals.
Responsibilities
Provide Tier 2 incident response services to the global organization on behalf of the Information Security Team
Receive, process, and resolve tickets per defined SLAs
Analyze information garnered from monitoring systems, operational incidents, and other sources to determine the scope and impact of potential security incidents, and process accordingly
Critically assess current practices and provide feedback to management on improvement opportunities
Assist with the design and implementation of threat detection and prevention solutions identified as necessary for the protection of Firm assets
Effectively utilize common IR toolsets, platforms, and processes, such as SIEM, log management, packet capture, and breach detection systems
Assist with forensic examinations and chain-of-custody procedures as directed by the Security Incident Response Engineers
Provide input into standards and procedures
Report compliance failures to management for immediate remediation
Maintain assigned systems to ensure availability, reliability, and integrity, including the oversight of current and projected capacity, performance, and licensing
Provide status reports and relevant metrics to the Security Operations Manager
Contribute to the Firms security-related information repositories and other marketing/awareness endeavors
Participate in special projects as needed
Skills and Experience
Education
Possess a Computer Science Bachelor’s Degree or substantial equivalent experience
Special Requirements, Licenses, and Certifications (desirable but not required):
GSEC, GCIH, GCFE, GREM
CISSP or SSCP
Experience
Some professional experience in information security with a focus on incident response and forensics
Foundational knowledge of IR concepts and best practices, including forensics and chain-of-custody
Experience with common IR tools such as SIEM, log management, IDS, breach detection systems (APT/BDS/EDR), and packet capture.
Broad understanding of TCP/IP, DNS, common network services, and other foundational topics
Working knowledge of malware detection, analysis, and evasion techniques
Able to conduct static and dynamic analysis of malware to extract indicators of compromise, profile malware behavior, and provide recommendations for mitigating and detecting malware;
Able to analyze suspicious websites, script-based and malware code
Experience with vulnerability management tools such as Qualys, Nessus, or other vulnerability scanning discovery tools
Broad familiarity with the threat landscape and the ability to adapt practices to evolving circumstances
Identify, analyze, and report threats within the enterprise by using information collected from a variety of sources (IDS/IPS, SIEM, AV), to protect data and networks. Implement techniques to hunt for known and unknown threats based on available threat intelligence reports and knowledge of the attackers TTPs
Able to gather and analyze facts, draw conclusions, define problems, and suggest solutions
Maintain critical thinking and composure under pressure
Strong written and oral communication skills. Ability to convey complex concepts to non-technical constituents. Proficiency in oral and written English
Capable of assisting with the preparation of internal training materials and documentation
Able to be productive and maintain focus without direct supervision
Passionate in the practice and pursuit of IR excellence
Can exhibit a disciplined and rigorous approach to incident handling
Willing to accommodate shift-based work for a global organization
Provide exemplary customer service by striving for first-call resolution and demonstrating empathy, respect, professionalism, and expertise
Experience with digital forensics on host or network and identification of anomalous behavior on the network or endpoint devices. Familiar with host and network-based forensic tools such as EnCase, FTK, Sleuth Kit, X Ways, etc.
Searching, interviewing and hiring are all part of the professional life. The TALENTMATE Portal idea is to fill and help professionals doing one of them by bringing together the requisites under One Roof. Whether you're hunting for your Next Job Opportunity or Looking for Potential Employers, we're here to lend you a Helping Hand.
Disclaimer: talentmate.com is only a platform to bring jobseekers & employers together.
Applicants
are
advised to research the bonafides of the prospective employer independently. We do NOT
endorse any
requests for money payments and strictly advice against sharing personal or bank related
information. We
also recommend you visit Security Advice for more information. If you suspect any fraud
or
malpractice,
email us at abuse@talentmate.com.
You have successfully saved for this job. Please check
saved
jobs
list
Applied
You have successfully applied for this job. Please check
applied
jobs list
Do you want to share the
link?
Please click any of the below options to share the job
details.
Report this job
Success
Successfully updated
Success
Successfully updated
Thank you
Reported Successfully.
Copied
This job link has been copied to clipboard!
Apply Job
Upload your Profile Picture
Accepted Formats: jpg, png
Upto 2MB in size
Your application for Incident Response Analyst
has been successfully submitted!
To increase your chances of getting shortlisted, we recommend completing your profile.
Employers prioritize candidates with full profiles, and a completed profile could set you apart in the
selection process.
Why complete your profile?
Higher Visibility: Complete profiles are more likely to be viewed by employers.
Better Match: Showcase your skills and experience to improve your fit.
Stand Out: Highlight your full potential to make a stronger impression.
Complete your profile now to give your application the best chance!