Incident Response Analyst Jobs
By CyberProof At Georgia, United States
- Evaluate alert/incident response requirements from stakeholders and determine the feasibility of response goals.
- Minimum of 5 years of experience in Information Security.
- In-depth operational experience with SIEM technologies.
- Minimum 2 years' experience in the playbook and IR response development.
- Penetration Testing experience or Security Assessment consulting.
- Excellent interpersonal and Analytical Skills to work effectively as a team player.
Customer Impact Response Analyst
By Discover Financial Services At Home Park, FL, United States
4+ years of experience In Project Management, Cross-Functional Management, Nontechnology Project Delivery, or related field
In lieu of a degree, 6+ years of experience in Customer Service, Project Management, Financial Services Operations, or related field
2+ years of experience in applicable line of business (Deposits, Personal Loans, Student Loans), or related field
Bachelor's Degree in Business, Arts and Sciences, or related field
Medical, Dental, Vision, & Health Savings Account
STD, Life, LTD and AD&D
Aba Crises Response - Lead Rbt
By Damar Services, Inc. At Greater Indianapolis, United States
Receive world-class training of verbal intervention & physical management techniques
Enjoy eligible holidays at home while getting paid with our Paid Holiday plan
Minimum 6 months previous experience with autism spectrum disorders required
Coursework and/or enrollment in supervision towards BCBA certification required.
Minimum age of 21 depending on program and / or department requirements.
Must meet and maintain background screening requirements for all Damar Programs as detailed in policy 1.HR.02 Pre-Employment and Employee Background Checks.
Incident Analyst Jobs
By Ascendion At Charlotte, NC, United States
Strong leadership and managerial skills, with experience leading incident response teams.
Deep knowledge of network security, system vulnerabilities, and common attack vectors.
Lead and manage the incident response team, providing guidance and technical expertise.
Proven experience as an incident response engineer or in a similar role.
Experience with SIEM, IDS/IPS, and forensic tools.
Excellent communication and collaboration skills.
Senior Incident Response Analyst
By Verizon At , Basking Ridge, Nj
Knowledge of Information Assurance or Cyber Experience in the Telecommunications industry.
Writing technical articles for knowledge sharing.
Bachelor’s degree or four or more years of work experience.
Four or more years of relevant work experience.
Three or more years of experience in Incident Handling.
Experience in a Security Operations Center (SOC) with focus on Computer Network Defense (CND).
Incident Response Analyst Jobs
By PayPal At , Scottsdale, Az $60,900 - $147,400 a year
Minimum 3-5 years of experience as a SOC analyst
Experience with troubleshooting and configuring networking devices, application platforms, and database, Windows and UNIX system administration
Analyze network traffic, endpoint indicators, and various log sources to identify the threat, assess the potential damage, and recommend countermeasures,
Propose additional components and techniques that could be used to proactively detect malicious activity
Recommend configuration changes to improve the performance, usability, and value of threat analysis tools
Communicate with all levels of technology and operational staff, assist in creation and follow methodologies, creating clear, concise deliverables
Manager, Cyber Incident Response
By ADM At Erlanger, KY, United States
Applies comprehensive knowledge and a thorough understanding of Incident Response concepts, principles, and technical capabilities
Possess functional knowledge and administrative experience on Windows and Unix/Linux Platforms.
Staying up to date with new security capabilities and providing recommendations best suited and prioritized for appropriate cyber response.
Excellent verbal and written communication skills, including ability to effectively communicate with internal and external customers
Strong knowledge of IT, computer science concepts
5+ years’ experience in cyber incident response, or similar cyber field, including experience with security principles, and defense-in-depth techniques.
Incident Response Analyst Jobs
By AnChain.AI At San Francisco Bay Area, United States
2+ years of incident analysis, malware research, SOC, or any other similar incident response experience.
1+ years' experience working at the security team at cryptocurrency exchanges with hands-on incident response experience.
2+ years' experience working at Tier 1 cybersecurity companies: Mandiant (Google Cloud), FireEye, Palo Alto Networks, Crowdstrike, ZScaler, etc.
3+ years’ experience with purple or blue teaming, or SOC experience
Provide expert level knowledge of tools and technologies used for enterprise security
Cyber security relevant certifications (Security+, CEH, GIAC GCIA, GCIH, CISSP, etc.)
Manager, Cybersecurity Incident And Breach Response
By Delectus, Leader in Executive Search, Staffing and HR Consulting Solutions At Washington, DC, United States
Experience working in a federated functional organization and influencing leadership and employees not in your direct management chain/scope of control
Hands on experience in security systems, including vulnerability management, identity and access management, security risk assessments, application testing, etc.
Working knowledge of IT processes (i.e., ITIL) including incident, problem, defect, change and release management
Familiarity with networking vulnerabilities and exploit methods such as DDoS, XSS attacks, SQL injection and how to recognize attacks in-progress
Experience maintaining metrics and SLAs
Detailed technical knowledge of network, database, and/or operating system security
Senior Incident Response Analyst (It Security Specialist)
By Voya Financial At , Remote
Experience with GitHub, code management and versioning and documenting in markup a plus.
Manage security incidents from multiple sources including: privacy, vulnerabilities, phishing, malware, ransomware, and forensic investigations
3 most important skills: Incident Response -level 2 or 3, Cloud experience (prefer Azure, but AWS ok), and Forensics.
Experience with SEIM platforms such as SPLUNK: writing searches, creating dashboards, and performing forensics.
Experience with Endpoint detection and prevention suites (Symantec, Splunk, CrowdStrike, etc.): performing forensics, securing devices and collecting evidence.
A CISM or CISSP certification is desirable, to include those with Associate of (ISC)2 status.
Lead Incident Technician Jobs
By Bamboo Health At , Remote
Facilitating release management, outage events, etc.
Work with engineering and problem management to create/adapt to new processes.
Work well under pressure with differing levels of Management.
Working knowledge of all the NOC’s support processes and project roadmap
Experience working in a fast-paced, high-growth, rapidly changing work environment.
Computer Sciences degree or 2–5 years’ equivalent experience working within a Network Operations Center.
Incident Management Analyst Jobs
By Inserso At , Remote
Experience with people-coordination or project management efforts involving more than 10 individuals, including senior management
Experience documenting incident resolution processes, creating reports, and providing timely status to management
Experience in the incident, change and problem management process
Incident initiation, management of bridge calls, communications and escalations
Coordination with the Problem Management Team and Change Management Team
Distribute reports to technical team leads and management; participate in meetings to share metrics results
Incident Management Analyst Jobs
By Orion Advisor Solutions At , Omaha, Ne $90,784 - $140,617 a year
Background in Lean/Agile project management skills, methods, and tools.
Project management certification a plus (PMP, Scrum, other).
Minimum of 5 years experience in technical project management, IT Security, Site Reliability Engineering, or IT/operations analysis required.
Minimum of 3 years experience with PagerDuty or other incident response platform required.
Experience with Site Reliability and DevOps culture and principles preferred.
Minimum of 2 years experience with Power BI preferred.
Incident Analyst Jobs
By Bamboo Health At , Remote
Facilitating release management, outage events, etc.
Work with engineering and problem management to create/adapt to new processes
Work well under pressure with differing levels of Management.
Working knowledge with the applications/tools we utilize in the NOC
Working knowledge of all the NOC’s support processes
Experience working a fast-paced, high-growth, rapidly changing work environments.
Incident Response Analyst Jobs
By TikTok At , San Jose, Ca $90,000 - $133,000 a year
Strong Operating System Administration skills, including conceptual knowledge of OS internals and experience with core service types
At least 1-3 years of experience handling security related incidents.
Experience in computer security incident handling
Excellent analytical and problem-solving skills
Excellent communication skills (verbal and written), teamwork and collaboration skills
Conduct technical analysis and assessments of security-related incidents, including malware analysis, packet-level analysis, and system-level forensic analysis

Are you looking for an exciting opportunity to use your technical skills to protect an organization's data and systems? We are looking for a Lead Incident Response Analyst to join our team and help us respond to security incidents. In this role, you will be responsible for leading investigations, analyzing security events, and developing strategies to prevent future incidents. If you have a passion for security and a desire to make a difference, this is the job for you!

Overview Lead Incident Response Analysts are responsible for leading and managing the incident response process for an organization. They are responsible for developing and implementing incident response plans, coordinating response activities, and providing technical guidance and support to other team members. Detailed Job Description Lead Incident Response Analysts are responsible for leading and managing the incident response process for an organization. They are responsible for developing and implementing incident response plans, coordinating response activities, and providing technical guidance and support to other team members. They must be able to identify and analyze security threats, develop strategies to mitigate risks, and respond to incidents in a timely manner. They must also be able to communicate effectively with stakeholders, both internal and external, and provide regular updates on incident response activities. Job Skills Required
• Knowledge of incident response processes and procedures
• Knowledge of security threats and vulnerabilities
• Ability to analyze security threats and develop strategies to mitigate risks
• Ability to communicate effectively with stakeholders
• Ability to coordinate response activities
• Ability to provide technical guidance and support to other team members
• Knowledge of security tools and technologies
• Knowledge of network and system administration
Job Qualifications
• Bachelor’s degree in Computer Science, Information Technology, or a related field
• 5+ years of experience in incident response or related field
• Certified Incident Handler (GCIH) or equivalent certification
• Experience with security tools and technologies
• Experience with network and system administration
Job Knowledge
• Knowledge of incident response processes and procedures
• Knowledge of security threats and vulnerabilities
• Knowledge of security tools and technologies
• Knowledge of network and system administration
Job Experience
• 5+ years of experience in incident response or related field
• Experience with security tools and technologies
• Experience with network and system administration
Job Responsibilities
• Develop and implement incident response plans
• Coordinate response activities
• Analyze security threats and develop strategies to mitigate risks
• Respond to incidents in a timely manner
• Communicate effectively with stakeholders
• Provide technical guidance and support to other team members
• Monitor security threats and vulnerabilities
• Update incident response plans as needed