Incident Responder

Key Role:

Serve as a technical lead and manager for commercial client tasks, including the assessment, design, and implementation of enterprise security prevention, detection, and response capabilities. Lead a diverse team of analysts in conducting event detection, incident triage, incident handling, and remediation. Handle major high impact incidents, generate clear, concise recommendations, and coordinate activities and professional communications across a range of stakeholders. Work closely with client security teams to develop, tune, automate, and enhance network- and host-based security devices and support the incident response fly away team with managing the response to client Cyber intrusions, including performing extensive network and host triage, maintaining strict chain-of-custody, developing documentation and reports, and performing remediation, as required. This position requires the ability to travel up to 80%, often on short notice.


Basic Qualifications:

-5+ years of experience with incident management and response activities across the incident life cycle

-Experience with Microsoft Office Suite, including Word, Excel and PowerPoint

-Knowledge of the security tools and techniques used by Cybersecurity teams

-Ability to work independently and handle multiple tasks concurrently

-Ability to manage and mold a team of high performing analysts to overcome new challenges

-Ability to think of technical obstacles and challenges in the broader business context

-Ability to travel up to 80% of the time, often on short notice

-HS diploma or GED


Additional Qualifications:

-Experience with performing host and network forensics analysis, including using timestamps across different log types to develop authoritative timelines of activity to find evidence of malicious activity

-Experience with performing anomaly or malware hunts using a common framework and standard methodology, including the MITRE ATT&CK framework

-Experience with configuring and executing sweep parameters using tools that include GRR Rapid Response

-Experience with conducting digital memory acquisition using Volatility, Rekall, or similar tools and extracting malicious binaries for analysis

-Experience with setting up and using isolated machines or environments for malware detonation and indicator of compromise identification

-Experience with performing static code analysis, including dissecting suspicious subroutines in assembly

-Experience with common scripting languages, including using Perl or Python in the context of incident response and security operations

-Knowledge of the following security-related technologies: IDS/IPS, SIEM, firewalls, log management, HIDS/NIDS, proxies, endpoint detection and response, and other enterprise-level appliances

-Possession of excellent oral and written communication skills, including adapting style and messaging to communicate with professionals at all levels effectively

-BA or BS degree

-One or more of the following certifications:  GIAC Certified Incident Analyst (GCIA), Certified Computer Security Incident Handler (CSIH), GIAC Network Forensic Analyst (GNFA), GIAC Certified Forensic Analyst (GCFA), CREST Certified Incident Manager, or CREST Certified Network Intrusion Analyst

We’re an EOE that empowers our people—no matter their race, color, religion, sex, gender identity, sexual orientation, national origin, disability, veteran status, or other protected characteristic—to fearlessly drive change.


Not ready to apply? Join our talent community and sign up for job alerts.