Incident Response Crew Jobs
By Webber At Staunton, VA, United States
Established knowledge of incident response and infrastructure
Basic knowledge of the standard methods, materials, tools, and equipment used in concrete, asphalt repair, construction, and
Two (2) years' work experience in incident response, safety, infrastructure maintenance, or related field. (Required)
Rapidly respond to traffic related incidents.
Assist law enforcement officers on managing traffic or roadway related incidents.
Maintain clean appearance of highways and medians including removal and disposal of litter and debris.
Incident Response Analyst Jobs
By MartinFed At Merritt Island, FL, United States
Analyze and correlate incident data to identify specific vulnerabilities and make recommendations that enable expeditious remediation.
At least 2 year experience related to Digital Forensics & Incident Response (DFIR), Security Operating Center (SOC), or LEO DF Unit.
At least 1 years' experience with technical writing, developing technical documents, and incident response reporting.
Holds an intermediate level, industry recognized, certification (GCIH/GCFE/GCFA/GNFA//GREM/CFCE/CAWFE/EnCE/CCE).
Strong experience with Unix/Linux system administration.
Strong experience with Windows system administration.
Cyber Incident Analyst Jobs
By Veterans Enterprise Technology Solutions At , Washington, 20001
Experience using BMC Remedy or ServiceNow service management/ticketing system is desirable.
Provides knowledge and expertise in tools, techniques, countermeasures, and trends in computer and network vulnerabilities and threats.
Network Packet capture (PCAP), report writing, remote forensics, Splunk UBA and Splunk SOAR experiences are nice to have.
BS or equivalent + 5 years related experience, or MS + 3 years related experience.
Hands-on experience with Splunk Enterprise Security performing searches and reviewing log sources.
Must have recent hands-on experience with incident response life cycles including analysis, containment, eradication, recovery, and post incident activities.
Senior Cyber Security Analyst I - Soc/Incident Response
By Staples At Framingham, MA, United States
•Experience with SIEMs and case management systems
•Desire to bring innovative ideas and experience to help further the SOC’s capabilities
•Desire to mentor and help junior analysts gain knowledge and experience
Interested in joining the team? Check out our perks and benefits !
•Real-world experience managing incident response situations of varying complexity.
•Strong organizational and communication skills
Cyber Incident Response Team Forensic Analyst - Remote
By Center for Internet Security, Inc. At ,
2+ years’ experience in Security/Network Administrator or equivalent knowledge
Knowledge of system and application security threats and vulnerabilities
Assist with the analysis of previously undisclosed software and hardware vulnerabilities
Other tasks and responsibilities as assigned
Knowledge of incident response procedures, processes, and techniques
Knowledge of various host and network-based security controls
Incident Response Analyst Jobs
By TikTok At , San Jose $80,000 - $100,000 a year
Develop SOAR playbooks, automate routine processes, create or enhance detection and response capabilities
At least 1-3 years of experience handling cybersecurity related incidents
Strong Linux fundamentals, experience operating and investigating incidents in *NIX environments
Experience with scripting languages (e.g. Python, Go and PowerShell) for automation and analysis
Excellent communication skills (verbal and written), teamwork and collaboration skills
Bachelor's degree in Cybersecurity, Computer Science, or a technical field (or equivalent work experience in related field
Senior Analyst, Cx Incident Response
By Coinbase At , Remote $80,750 - $95,000 a year
Demonstrated experience with end-to-end platform incident management.
Minimum of 2 years of relevant experience in incident management and/or customer support.
Advanced experience in project management, analytics or quality assurance.
Advanced degree in business, finance, customer experience and/or blockchain.
Motivated by Coinbase’s mission and creating a seamless support experience for our global customer base.
Experience with CRM tooling, such as Salesforce.
Senior Security Analyst - Incident Response
By City IT At ,
Creation and management of tabletop exercises
Experience handling SOC related alerts
Architect and build deceptive technologies infrastructure & reporting
Build IR communications plans and templates
Identifying, building, and testing IR technical playbooks
Work on security alerts to identify issues
Manager Incident Response Jobs
By Ann & Robert H. Lurie Children's Hospital of Chicago At Streeterville, IL, United States
Familiarity and experience with crisis management, disaster recovery and business availability programs and procedures.
Conduct and coordinate Information Management department (First Responder) and Organizational (Crisis Manager) preparedness exercises.
Experience and knowledge with information security frameworks, regulatory compliance and reporting bodies (HITRUST, NIST, HIPAA, DHHS, etc.).
Oversee administration of Managed Security Service Provider (MSSP) services to include Security Operations Center, Incident Assistance and Data Forensics firms.
Manages all aspects of technical security incident response to include assessment, containment and reporting.
5+ years of experience in information security incident response required.
Incident Response Consultant, Mandiant, Google Cloud
By Google At Georgia, United States
Bachelor's degree in Computer Science, Information Systems, related technical field, or equivalent practical experience.
2 years of experience leading incident response investigations, analysis, and containment actions.
Cloud incident response or forensic experience.
Ability to communicate investigative findings and strategies to technical staff, executive leadership, legal counsel, and internal and external clients.
Ability to travel up to 20% of the time.
Work through client-facing incident response engagements, examine cloud, endpoint, and network-based sources of evidence.
Incident Response Analyst Jobs
By Verizon At , Temple Terrace, Fl $108,000 - $201,000 a year
Knowledge of Information Assurance or Cyber Experience in the Telecommunications industry.
Writing technical articles for knowledge sharing.
Bachelor’s degree or four or more years of work experience.
Four or more years of relevant work experience.
Two or more years of Security Operations and/or Incident Handling experience.
Experience in a Security Operations Center (SOC) with focus on Computer Network Defense (CND).
Digital Forensics And Incident Response Analyst
By Connecting Experts At , Remote
Knowledge of Intrusion Detection Systems (IDS) and SIEM technologies; Splunk or ArcSight experience
Knowledge and experience with scripting and programming (Python, PERL, etc.) are also highly preferred
Advanced knowledge of TCP/IP protocols
Bachelor-s degree or equivalent experience
Knowledge of Windows, Linux operating systems
Oversee incident response tasks and train junior staff
Threat Response Analyst (Remote)
By CrowdStrike At , Remote $90,000 - $150,000 a year
Two (2) or more years of significant client-facing experience
Managed or enterprise information security services
Bonus points for experience with big-data processing tools such as Splunk, Humio, Logstash, Kibana, etc.
Strong written and verbal communication skills
Strong understanding of MITRE ATT&CK techniques / sub-techniques and ability to articulate TTPs to customers of varying technical abilities
Comprehensive and inclusive health benefits
Senior Incident Response Consultant, Mandiant, Google Cloud
By Google At Colorado, United States
Effective time management skills to balance time among multiple tasks and mentor junior consultants as needed
Experience leading Incident Response investigations, analysis, or containment actions
Experience with enterprise security architecture and security controls
Experience in Cloud incident response or forensic
Clear and organized verbal and written communication and collaboration skills
Remote locations: Arizona, USA; California, USA; Colorado, USA.
Cyber Incident Response Associate Analyst
By Ntelicor is becoming INSPYR Solutions At Dallas-Fort Worth Metroplex, United States
Prior cyber experience in two (2) or more of the following:
Knowledge of how malware operates.
Experience with forensics tools and analysis
Skilled in event analysis leveraging computer forensics tools
Excellent written and verbal communication skills
Develop high-quality customer deliverables that meet the expectations of the organization. This includes:
Global Director, Incident Response
By MongoDB At New York, NY, United States
Prior global people management experience with a focus on career development in a high-growth, rapidly changing corporate environment.
Experience producing management dashboards and scorecards using tools like Tableau.
Experience with implementing ITIL, Incident Command, and knowledge services.
Network with Peers across Customer Engineering, Customer Success, Development and Product Management
Conducts listening sessions amongst global leaders about areas for improvement in the escalation management program
Implements effective bi-directional communication between the escalation management team and the Americas management team
Digital Forensics And Incident Response Analyst
By Connecting Experts At United States
Knowledge of Intrusion Detection Systems (IDS) and SIEM technologies; Splunk or ArcSight experience
Knowledge and experience with scripting and programming (Python, PERL, etc.) are also highly preferred
Advanced knowledge of TCP/IP protocols
Bachelor-s degree or equivalent experience
Knowledge of Windows, Linux operating systems
Oversee incident response tasks and train junior staff
Information Security Operations Center And Incident Response Manager (Remote)
By Crane Company At United States
Proficiency leading projects and project management experience with a focus on delivering results.
Experience managing, leading, and working with remote/distributed teams with diverse backgrounds.
Manage Security Operations Center personnel, partner relationship and supporting technologies.
Assist in ensuring the performance of key partner relationships and managed security services providers.
Required: 5-7 or more years relevant professional experience in a SOC performing IR.
Ninja-level knowledge of Windows, Linux Internals, Network Threat Identification, Cloud Security Protections.
Senior Incident Response Analyst
By Xerox At United States
Strong attention to detail, time management and analytical skills
Knowledge of common security vulnerabilities including OWASP Top 10 and SANS 25
Analyzing, triaging and managing incidents end-to-end based on business impact and applicable privacy/legal/regulatory requirements
At least 4+ years of professional experience in an incident response role
Experience analyzing and responding to incidents in cloud environments
Strong written and communication skills
Cyber Security Analyst - Incident Response
By Convergenz At United States
5-7 years of Information Security or Incident Response related experience
Proven experience in day-to-day operational processes such as security monitoring, data correlation, troubleshooting, security operations etc.
Strong knowledge of enterprise detection technologies and processes (Detection Tools, IDS/IPS, EDR, NDR, Network Packet Analysis, Endpoint Protection).
Demonstrated experience with utilizing SIEM (such as Splunk)
This is a fully remote contract -
• Develop and administer data security policies

Are you looking for an exciting and challenging role in the field of Incident Response? We are looking for an experienced Incident Response Analyst to join our team and help us protect our organization from cyber threats. You will be responsible for responding to and investigating security incidents, analyzing security events, and developing strategies to prevent future incidents. If you have a passion for security and a desire to protect our organization, this is the job for you!

Overview An Incident Response Analyst is a professional who is responsible for responding to and managing security incidents. They are responsible for identifying, analyzing, and responding to security threats and incidents. They must be able to quickly assess the situation, identify the source of the incident, and take the necessary steps to mitigate the risk. Detailed Job Description An Incident Response Analyst is responsible for responding to and managing security incidents. They must be able to quickly assess the situation, identify the source of the incident, and take the necessary steps to mitigate the risk. They must be able to analyze and interpret security data, identify potential threats, and develop and implement appropriate response plans. They must also be able to communicate with stakeholders, provide technical guidance, and coordinate with other teams to ensure the incident is resolved in a timely manner. Job Skills Required
• Knowledge of security principles, technologies, and best practices
• Knowledge of incident response processes and procedures
• Ability to analyze and interpret security data
• Ability to identify potential threats
• Ability to develop and implement appropriate response plans
• Excellent communication and interpersonal skills
• Ability to work independently and as part of a team
• Ability to work under pressure and meet tight deadlines
Job Qualifications
• Bachelor’s degree in Computer Science, Information Security, or related field
• Relevant certifications such as CISSP, CISM, or CISA
• 3+ years of experience in information security or incident response
• Experience with security tools such as SIEM, IDS/IPS, and vulnerability scanners
Job Knowledge
• Knowledge of security principles, technologies, and best practices
• Knowledge of incident response processes and procedures
• Knowledge of security tools such as SIEM, IDS/IPS, and vulnerability scanners
• Knowledge of network protocols and architectures
Job Experience
• 3+ years of experience in information security or incident response
• Experience with security tools such as SIEM, IDS/IPS, and vulnerability scanners
• Experience with incident response processes and procedures
Job Responsibilities
• Respond to and manage security incidents
• Analyze and interpret security data
• Identify potential threats
• Develop and implement appropriate response plans
• Communicate with stakeholders
• Provide technical guidance
• Coordinate with other teams to ensure the incident is resolved in a timely manner