Senior Cybersecurity Incident Response Analyst
By Xerox At United States
Strong attention to detail, time management and analytical skills
Knowledge of common security vulnerabilities including OWASP Top 10 and SANS 25
Analyzing, triaging and managing incidents end-to-end based on business impact and applicable privacy/legal/regulatory requirements
At least 4+ years of professional experience in an incident response role
Experience analyzing and responding to incidents in cloud environments
Strong written and communication skills
Associate Analyst, It Cybersecurity Incident Response
By American Airlines At Phoenix, AZ, United States
This job is a member of the Cybersecurity Incident Response Team (CIRT) within the Cyber Security Technology Risk Management division.
Stay up to date with current vulnerabilities, exploits and countermeasures.
1 year of Information Security experience
Working knowledge of standard network infrastructure and protocols
Excellent written and verbal communication skills
Bachelor's degree in Computer Science, Computer Engineering, Technology, Information Systems (CIS/MIS), Engineering or related technical discipline, or equivalent experience/training
Cyber Incident Response – Automation Engineer
By Zions Bancorporation At Midvale, UT, United States
2+ years of development experience with scripting languages such as Python and JavaScript
4+ years of progressive technical experience in a Computer Science and/or a Cybersecurity domain
Experience integrating web-services such as API and REST
Experience with UNIX/Linux, Windows, and Containerization
Knowledge of cybersecurity tools such as SIEM, IDS, EDR, etc.
Knowledge of common cybersecurity attack methods
Cyber Detection And Response Analyst
By ManTech At McLean, VA, United States
Knowledge of threat intelligence, vulnerability management, and security incident response best practices.
Threat Intelligence and Vulnerability Management
Experience in working within a Cyber Incident Response Team or Security Operations Center.
Experience with using SIEM systems, network security tools, and log analysis tools.
Knowledge of cybersecurity principles, incident detection, analysis, and response methodologies.
Knowledge of operating systems, network protocols, and security technologies.
Cyber Security Incident Response Analyst
By Pinnacle Group, Inc. At Dallas, TX, United States
Strong security-related experience, to include data analysis and data science skills
Must be committed to incorporating security into all decisions and daily job responsibilities
3+ years of related experience
Professional security experience such as: incident response, alert monitoring, cloud security, forensic investigations, security awareness, etc.
Excellent problem solving and analytical skills, the ability to define problems, collect data, establish facts and draw valid conclusions
Strong documentation and reporting skills
Incident Response Dispatch Jobs
By Webber At Bristol, FL, United States
Knowledge of traffic and real-time incident management operations (Preferred)
Prior work experience in a transportation management / traffic operations control center preferred
Participate in frequent training opportunities including induction, cross skilling, toolbox, and NIMS
Avoids legal challenges by complying with federal, state, and local legal requirements.
Occasionally assist with administrative duties at the Managers discretion.
High level of attention to detail, initiative, problem solving, personal organizational and leadership skills.
Incident Response Analyst Jobs
By Foregenix At United States
Offer support to the Digital Forensics team during investigations (as required), while embracing the opportunity to learn from highly experienced investigators
A minimum of3 years’ experience in a network/security related IT Role
Solid knowledge of both Windows and Linux based systems at an operational level
Reverse engineering skills a definite positive
SOC or NOC experience advantageous
Responsible for reviewing and monitoring client system security status on an ongoing basis
Incident Management Analyst Jobs
By Horizon Staffing 2003 At Houston, TX, United States
In the event of an outage, incident or emergency, ensures all Incident Management processes are adhered to.
Detection of possible problems and the assignment to the Problem Management team.
Participation in audit activities related to the Incident Management process
Responsible for Incident Management reporting.
Collaborates with IS Leadership and IS Executive teams in driving service management best practice and ITIL process standardization.
Continuous development and daily management of Service Quality.
Incident Response Analyst Jobs
By CyberProof At Georgia, United States
- Evaluate alert/incident response requirements from stakeholders and determine the feasibility of response goals.
- Minimum of 5 years of experience in Information Security.
- In-depth operational experience with SIEM technologies.
- Minimum 2 years' experience in the playbook and IR response development.
- Penetration Testing experience or Security Assessment consulting.
- Excellent interpersonal and Analytical Skills to work effectively as a team player.
Customer Impact Response Analyst
By Discover Financial Services At Home Park, FL, United States
4+ years of experience In Project Management, Cross-Functional Management, Nontechnology Project Delivery, or related field
In lieu of a degree, 6+ years of experience in Customer Service, Project Management, Financial Services Operations, or related field
2+ years of experience in applicable line of business (Deposits, Personal Loans, Student Loans), or related field
Bachelor's Degree in Business, Arts and Sciences, or related field
Medical, Dental, Vision, & Health Savings Account
STD, Life, LTD and AD&D
Incident Review Analyst - Lte
By State of Wisconsin At , Madison, 53703, Wi $31 - $33 an hour
Experience reviewing and assessing information contained in documents, voicemails, and other communications.
Experience using computer programs or databases to input data, conduct analysis and review reports.
Experience reviewing information and consistently applying standards (e.g., policies, administrative rules, statutes, etc.) to aid decision making.
Experience working in a healthcare setting.
Experience investigating or triaging reports of abuse, neglect, or misappropriation.
Wisconsin residency is required for LTE positions.
Incident Analyst Jobs
By Ascendion At Charlotte, NC, United States
Strong leadership and managerial skills, with experience leading incident response teams.
Deep knowledge of network security, system vulnerabilities, and common attack vectors.
Lead and manage the incident response team, providing guidance and technical expertise.
Proven experience as an incident response engineer or in a similar role.
Experience with SIEM, IDS/IPS, and forensic tools.
Excellent communication and collaboration skills.
Senior Incident Response Analyst
By Verizon At , Basking Ridge, Nj
Knowledge of Information Assurance or Cyber Experience in the Telecommunications industry.
Writing technical articles for knowledge sharing.
Bachelor’s degree or four or more years of work experience.
Four or more years of relevant work experience.
Three or more years of experience in Incident Handling.
Experience in a Security Operations Center (SOC) with focus on Computer Network Defense (CND).
Remote Manager, Global Incident Response (Cyber Security) - Rh
By Reyes Holdings At Rosemont, IL, United States
3+ years of management experience leading team.
Oversee all people-management activities for direct reports, including establishing goals and providing mentorship for team members.
Manage the IR team and MSSP personnel supporting IR functions.
Participate in developing Purple Team activities to facilitate team and individual skill improvement, as well as improve security controls.
Identify weaknesses and strengths of security controls and work with IT to improve prevention, detection, and response capabilities.
5+ years of experience in a hands-on incident response, threat hunting, or forensics role.
Incident Response Analyst Jobs
By PayPal At , Scottsdale, Az $60,900 - $147,400 a year
Minimum 3-5 years of experience as a SOC analyst
Experience with troubleshooting and configuring networking devices, application platforms, and database, Windows and UNIX system administration
Analyze network traffic, endpoint indicators, and various log sources to identify the threat, assess the potential damage, and recommend countermeasures,
Propose additional components and techniques that could be used to proactively detect malicious activity
Recommend configuration changes to improve the performance, usability, and value of threat analysis tools
Communicate with all levels of technology and operational staff, assist in creation and follow methodologies, creating clear, concise deliverables
Off Duty Officer - Critical Incident Response Team
By Security Industry Specialists, Inc. At , Fremont, 94555, Ca Up to $50 an hour
Must possess excellent time management and administrative skills
Develop and manage customized security or operations plans in partnership with executive
Manage security, law enforcement, and medical personnel response as part of the overall security
Minimum five years experience with a federal, state, or local law enforcement agency, showing
Complete and maintain state guard certification as prescribed by presiding state law, as well as all
Tactical Operations or Executive Protection experience
Manager, Cyber Incident Response
By ADM At Erlanger, KY, United States
Applies comprehensive knowledge and a thorough understanding of Incident Response concepts, principles, and technical capabilities
Possess functional knowledge and administrative experience on Windows and Unix/Linux Platforms.
Staying up to date with new security capabilities and providing recommendations best suited and prioritized for appropriate cyber response.
Excellent verbal and written communication skills, including ability to effectively communicate with internal and external customers
Strong knowledge of IT, computer science concepts
5+ years’ experience in cyber incident response, or similar cyber field, including experience with security principles, and defense-in-depth techniques.
Incident Response Analyst Jobs
By AnChain.AI At San Francisco Bay Area, United States
2+ years of incident analysis, malware research, SOC, or any other similar incident response experience.
1+ years' experience working at the security team at cryptocurrency exchanges with hands-on incident response experience.
2+ years' experience working at Tier 1 cybersecurity companies: Mandiant (Google Cloud), FireEye, Palo Alto Networks, Crowdstrike, ZScaler, etc.
3+ years’ experience with purple or blue teaming, or SOC experience
Provide expert level knowledge of tools and technologies used for enterprise security
Cyber security relevant certifications (Security+, CEH, GIAC GCIA, GCIH, CISSP, etc.)
Manager, Cybersecurity Incident And Breach Response
By Delectus, Leader in Executive Search, Staffing and HR Consulting Solutions At Washington, DC, United States
Experience working in a federated functional organization and influencing leadership and employees not in your direct management chain/scope of control
Hands on experience in security systems, including vulnerability management, identity and access management, security risk assessments, application testing, etc.
Working knowledge of IT processes (i.e., ITIL) including incident, problem, defect, change and release management
Familiarity with networking vulnerabilities and exploit methods such as DDoS, XSS attacks, SQL injection and how to recognize attacks in-progress
Experience maintaining metrics and SLAs
Detailed technical knowledge of network, database, and/or operating system security
Senior Incident Response Analyst (It Security Specialist)
By Voya Financial At , Remote
Experience with GitHub, code management and versioning and documenting in markup a plus.
Manage security incidents from multiple sources including: privacy, vulnerabilities, phishing, malware, ransomware, and forensic investigations
3 most important skills: Incident Response -level 2 or 3, Cloud experience (prefer Azure, but AWS ok), and Forensics.
Experience with SEIM platforms such as SPLUNK: writing searches, creating dashboards, and performing forensics.
Experience with Endpoint detection and prevention suites (Symantec, Splunk, CrowdStrike, etc.): performing forensics, securing devices and collecting evidence.
A CISM or CISSP certification is desirable, to include those with Associate of (ISC)2 status.

Are you looking for an exciting and challenging role in the field of Incident Response? We are looking for an experienced Incident Response Analyst to join our team and help us protect our organization from cyber threats. You will be responsible for responding to and investigating security incidents, analyzing security events, and developing strategies to prevent future incidents. If you have a passion for security and a desire to protect our organization, this is the job for you!

Overview An Incident Response Analyst is a professional who is responsible for responding to and managing security incidents. They are responsible for identifying, analyzing, and responding to security threats and incidents. They must be able to quickly assess the situation, identify the source of the incident, and take the necessary steps to mitigate the risk. Detailed Job Description An Incident Response Analyst is responsible for responding to and managing security incidents. They must be able to quickly assess the situation, identify the source of the incident, and take the necessary steps to mitigate the risk. They must be able to analyze and interpret security data, identify potential threats, and develop and implement appropriate response plans. They must also be able to communicate with stakeholders, provide technical guidance, and coordinate with other teams to ensure the incident is resolved in a timely manner. Job Skills Required
• Knowledge of security principles, technologies, and best practices
• Knowledge of incident response processes and procedures
• Ability to analyze and interpret security data
• Ability to identify potential threats
• Ability to develop and implement appropriate response plans
• Excellent communication and interpersonal skills
• Ability to work independently and as part of a team
• Ability to work under pressure and meet tight deadlines
Job Qualifications
• Bachelor’s degree in Computer Science, Information Security, or related field
• Relevant certifications such as CISSP, CISM, or CISA
• 3+ years of experience in information security or incident response
• Experience with security tools such as SIEM, IDS/IPS, and vulnerability scanners
Job Knowledge
• Knowledge of security principles, technologies, and best practices
• Knowledge of incident response processes and procedures
• Knowledge of security tools such as SIEM, IDS/IPS, and vulnerability scanners
• Knowledge of network protocols and architectures
Job Experience
• 3+ years of experience in information security or incident response
• Experience with security tools such as SIEM, IDS/IPS, and vulnerability scanners
• Experience with incident response processes and procedures
Job Responsibilities
• Respond to and manage security incidents
• Analyze and interpret security data
• Identify potential threats
• Develop and implement appropriate response plans
• Communicate with stakeholders
• Provide technical guidance
• Coordinate with other teams to ensure the incident is resolved in a timely manner