Incident Dispatcher Jobs
By Protos Security At Daleville, VA, United States

Company Protos Security Title Incident Support Specialist Location Daleville, VA Reports to Dispatch Supervisor Security Services Holdings LLC and its subsidiaries (the “Company”) provide technology ...

Cyber Incident Analyst Jobs
By Veterans Enterprise Technology Solutions At , Washington, 20001
Experience using BMC Remedy or ServiceNow service management/ticketing system is desirable.
Provides knowledge and expertise in tools, techniques, countermeasures, and trends in computer and network vulnerabilities and threats.
Network Packet capture (PCAP), report writing, remote forensics, Splunk UBA and Splunk SOAR experiences are nice to have.
BS or equivalent + 5 years related experience, or MS + 3 years related experience.
Hands-on experience with Splunk Enterprise Security performing searches and reviewing log sources.
Must have recent hands-on experience with incident response life cycles including analysis, containment, eradication, recovery, and post incident activities.
Incident Manager Jobs
By GDK Services LLC At San Antonio, TX, United States
Problem ManagementPeople ManagementChange ManagementStrong Communication Skills.
Serves as an ITIL Major Incident Management team member.
Examines root cause analysis reports to find trends supporting Problem Management.
ITILIncident Management Project Management ITSMService Now
Monitors and reports on adherence to defined ITSM processes.
Client: UHG (United Health Group)
It Analyst (Major Incident Management)
By ConglomerateIT LLC At Washington DC-Baltimore Area, United States
Required Qualifications - Knowledge, Skills and Abilities
·Ensures that incident management processes are efficiently and effectively followed within ISD
·Communicates operational issues to respective IT management, support teams, and incident communication managers
·Ensures continuous collaboration with IT Operations Management and other ISD areas or teams
·Ensures promptresolution and coordination of incident management activities during recovery efforts
·Updates and validates outage information in availability management tools for reporting and tracking purposes
Incident Manager Jobs
By Fortuna BMC At Cochiti Pueblo, NM, United States
Two years professional experience in incident management, practices and skills role.
Working knowledge of IT Service Management tools.
Driving the efficiency and effectiveness of the incident management process
Producing management information, including KPIs and reports
Ensuring that all IT teams follow the incident management process for every incident
Produces Problem Management reports and management information
Incident Management Analyst Jobs
By Horizon Staffing 2003 At Houston, TX, United States
In the event of an outage, incident or emergency, ensures all Incident Management processes are adhered to.
Detection of possible problems and the assignment to the Problem Management team.
Participation in audit activities related to the Incident Management process
Responsible for Incident Management reporting.
Collaborates with IS Leadership and IS Executive teams in driving service management best practice and ITIL process standardization.
Continuous development and daily management of Service Quality.
Incident Investigator Jobs
By MatchaTalent At Houston, TX, United States
Have excellent communication skills in English with peers as well as members of management.
Have ten years of experience investigating high consequence (major) industrial incidents.
Investigate industrial incidents, especially ones with high consequences and understand the hazards related to industrial facilities and their relevant controls.
Identify, preserve, and examine incident evidence using widely accepted forensic science principles.
Support investigation teams by ensuring proper investigation techniques are understood and used.
Conduct thorough investigations using appropriate investigative tools for the incident in question.
Incident Commander- Remote Jobs
By Splunk At , Remote $84,800 - $116,600 a year
SF Bay Area, Seattle Metro, and New York City Metro Area
Base Pay Range: $104,000.00 - 143,000.00 per year
California (excludes SF Bay Area), Washington (excludes Seattle Metro), Washington DC Metro, and Massachusetts
Base Pay Range: $94,400.00 - 129,800.00 per year
Base Pay Range: $84,800.00 - 116,600.00 per year
Incident Responder/Soc Analyst (Delivery Center-Remote)
By Deloitte At , Atlanta, 30303, Ga
Must possess project management skills to monitor tasks and provide deliverables.
Must demonstrate strong oral and written communication skills, with the ability to communicate technical topics to management and non-technical audiences.
Must possess communication skills to quickly understand program details, to work side-by-side with project managers, data experts, and analysts/programmers.
Must have experience configuring Security Orchestration, Automation, and Response tools, scripts, events, and playbooks.
Experience in SOAR, built playbook creation and SOAR tool administration.
Experience supporting security operation centers SOC.
Incident Review Analyst - Lte
By State of Wisconsin At , Madison, 53703, Wi $31 - $33 an hour
Experience reviewing and assessing information contained in documents, voicemails, and other communications.
Experience using computer programs or databases to input data, conduct analysis and review reports.
Experience reviewing information and consistently applying standards (e.g., policies, administrative rules, statutes, etc.) to aid decision making.
Experience working in a healthcare setting.
Experience investigating or triaging reports of abuse, neglect, or misappropriation.
Wisconsin residency is required for LTE positions.
Incident Analyst Jobs
By Ascendion At Charlotte, NC, United States
Strong leadership and managerial skills, with experience leading incident response teams.
Deep knowledge of network security, system vulnerabilities, and common attack vectors.
Lead and manage the incident response team, providing guidance and technical expertise.
Proven experience as an incident response engineer or in a similar role.
Experience with SIEM, IDS/IPS, and forensic tools.
Excellent communication and collaboration skills.
Incident Handler Jobs
By Ascendion At Charlotte, NC, United States
Strong leadership and managerial skills, with experience leading incident response teams.
Deep knowledge of network security, system vulnerabilities, and common attack vectors.
Lead and manage the incident response team, providing guidance and technical expertise.
Proven experience as an incident response engineer or in a similar role.
Experience with SIEM, IDS/IPS, and forensic tools.
Excellent communication and collaboration skills.
Incident Manager Jobs
By TechFetch.com - On Demand Tech Workforce hiring platform At New York, NY, United States

"ALL our jobs are US based and candidates must be in the US with valid US Work Authorization. Please apply on our website directly." Incident Manager Must be local to Wilmington, MA to go onsite 2 ...

Jr. Incident Responder/Soc Analyst
By Deloitte At , Lake Mary, Fl
Excellent written and verbal communication skills + Excellent organization, time management, and attention to detail
BA/BS Degree in Computer Science, Cyber Security, Information Security, Engineering, Information Technology, Finance, Business, Math or in other business-related fields.
1-3 years experience in cyber incident response/handling procedures.
Working Knowledge of Common adversary tactics, techniques, and procedures (TTPs).
Working knowledge of network infrastructure and communication protocols
Experience with basic scripting languages including python, PowerShell, bash, etc.
Threat And Incident Management Analyst
By ZETTALOGIX INC At United States

Job: Threat and Incident Management Analyst Location: REMOTE Duration: 6 Month contract About The Opportunity currently looking for a Threat and Incident Management Analyst for one of ...

Incident Responder/ Soc Analyst
By Deloitte At Alexandria, VA, United States
Excellent written and verbal communication skills + Excellent organization, time management, and attention to detail
2+ years experience in cyber incident response/handling procedures.
Working Knowledge of Common adversary tactics, techniques, and procedures (TTPs).
Working knowledge of network infrastructure and communication protocols
Experience with basic scripting languages including python, PowerShell, bash, etc.
In pursuit of (1) entry level cyber security focused certification from industry recognized Certification Provider (GSEC, Sec+, CND,CCNA-Sec, Etc.)
Soc Analyst / Incident Responder (Chicago Area)
By 7 Layer Solutions At , Chicago, Il
Perform threat and vulnerability management monitoring and provide remediation guidance
Experience with Scripting or programming skills (PERL, Python, PowerShell, etc.)
Experience with Incident Response and Threat Hunting
Experience with Endpoint and Network Detection Response technologies
Experience with Windows, Mac, Linux, iOS, and Network Operating Systems
Using SOC/Incident Response core skills including security event review, log analysis, host analysis, email analysis, and network analysis
Incident Management Analyst Jobs
By Inserso At , Remote
Experience with people-coordination or project management efforts involving more than 10 individuals, including senior management
Experience documenting incident resolution processes, creating reports, and providing timely status to management
Experience in the incident, change and problem management process
Incident initiation, management of bridge calls, communications and escalations
Coordination with the Problem Management Team and Change Management Team
Distribute reports to technical team leads and management; participate in meetings to share metrics results
Jr. Incident Responder/Soc Analyst
By Deloitte At , Rosslyn, 22209, Va
Excellent written and verbal communication skills + Excellent organization, time management, and attention to detail
BA/BS Degree in Computer Science, Cyber Security, Information Security, Engineering, Information Technology, Finance, Business, Math or in other business-related fields.
1-3 years experience in cyber incident response/handling procedures.
Working Knowledge of Common adversary tactics, techniques, and procedures (TTPs).
Working knowledge of network infrastructure and communication protocols
Experience with basic scripting languages including python, PowerShell, bash, etc.
Incident Management Analyst Jobs
By Orion Advisor Solutions At , Omaha, Ne $90,784 - $140,617 a year
Background in Lean/Agile project management skills, methods, and tools.
Project management certification a plus (PMP, Scrum, other).
Minimum of 5 years experience in technical project management, IT Security, Site Reliability Engineering, or IT/operations analysis required.
Minimum of 3 years experience with PagerDuty or other incident response platform required.
Experience with Site Reliability and DevOps culture and principles preferred.
Minimum of 2 years experience with Power BI preferred.

Are you looking for an exciting and challenging role in Incident Analysis? We are looking for an experienced Incident Analyst to join our team and help us identify, analyze, and respond to security incidents. You will be responsible for monitoring and analyzing security events, investigating incidents, and providing recommendations for remediation. If you have a passion for security and a desire to make a difference, this is the job for you!

An Incident Analyst is responsible for analyzing and responding to security incidents. They are responsible for identifying, investigating, and resolving security incidents, as well as providing recommendations to prevent future incidents. They must have a strong understanding of security protocols, network security, and incident response processes. To become an Incident Analyst, you must have a bachelor’s degree in computer science, information security, or a related field. You should also have experience in network security, incident response, and security protocols. Additionally, you should have strong analytical and problem-solving skills, as well as excellent communication and interpersonal skills.

The skills required for an Incident Analyst include:

• Knowledge of security protocols and network security
• Experience with incident response processes
• Strong analytical and problem-solving skills
• Excellent communication and interpersonal skills
• Ability to work independently and as part of a team
• Knowledge of security tools and technologies
• Ability to work under pressure and meet deadlines

The knowledge required for an Incident Analyst includes:

• Knowledge of security protocols and network security
• Knowledge of security tools and technologies
• Knowledge of incident response processes
• Knowledge of security best practices
• Knowledge of computer forensics
• Knowledge of malware analysis

The responsibilities of an Incident Analyst include:

• Identifying, investigating, and resolving security incidents
• Analyzing security logs and network traffic
• Developing and implementing security policies and procedures
• Monitoring security systems and responding to alerts
• Providing recommendations to prevent future incidents
• Documenting security incidents and providing reports

The experience required for an Incident Analyst includes:

• Experience with security protocols and network security
• Experience with incident response processes
• Experience with security tools and technologies
• Experience with computer forensics
• Experience with malware analysis
• Experience with security best practices

The qualifications required for an Incident Analyst include:

• Bachelor’s degree in computer science, information security, or a related field
• Relevant certifications such as CISSP, CISM, or CEH
• Experience in network security, incident response, and security protocols

The education required for an Incident Analyst includes:

• Bachelor’s degree in computer science, information security, or a related field
• Relevant certifications such as CISSP, CISM, or CEH

The tools that help Incident Analysts work better include:

• Security information and event management (SIEM) tools
• Network monitoring tools
• Intrusion detection systems (IDS)
• Security incident and event management (SIEM) tools
• Network forensics tools
• Malware analysis tools

Good tips to help Incident Analysts do more effectively include:

• Stay up to date on the latest security trends and technologies
• Develop and maintain strong relationships with stakeholders
• Utilize security best practices and standards
• Monitor security systems and respond to alerts quickly
• Document security incidents and provide reports

Common Incident Analyst interview questions include:

• What experience do you have with security protocols and network security?
• What experience do you have with incident response processes?
• What experience do you have with security tools and technologies?
• How do you handle security incidents?
• What security best practices do you follow?
• How do you stay up to date on the latest security trends and technologies?