As a Senior Incident Response Analyst, you will play an important role in safeguarding the organization's digital assets and infrastructure by proactively detecting, assessing, and responding to threats, vulnerabilities, and security incidents. Drawing on your knowledge of security principles, practices, and theories, you will collaborate with cross-functional teams to develop a coordinated approach to security and educate employees on best practices, policies, and procedures. Your work will have a direct impact on departmental outcomes, as you plan and ensure progress, identify gaps in information, and conduct analyses to solve complex cybersecurity problems. By utilizing your advanced analytical, technical, and problem-solving skills, you will contribute to the continuous improvement of our cybersecurity posture and help maintain the integrity, confidentiality, and availability of sensitive data and systems.
Job responsibilities
- Monitor and analyze security infrastructure, contributing to detection and response to threats, vulnerabilities, and incidents to ensure the integrity, confidentiality, and availability of sensitive data and systems
- Conduct in-depth security investigations, analyzing logs, network traffic, and other data sources to identify root causes, assess impact, and gather evidence for response and mitigation actions
- Develop and maintain threat detection and response playbooks, incorporating industry best practices, regulatory requirements, and lessons learned from previous incidents
- Collaborate with cross-functional teams to develop and implement coordinated security strategies, policies, and procedures, while educating employees on best practices
Required qualifications, capabilities, and skills
- At least 2-3 years of experience working in Information Security, with focus on Incident Detection, Investigation and Response
- Understanding of TCP/IP networking, including knowledge of routing, switching, and network protocols; familiarity with network security technologies
- Hands-on experience performing packet capture (PCAP), endpoint, network and application log analysis
- In-depth knowledge of Windows and Linux operating systems and how to investigate them for signs of compromise
- Experience with file analysis tools and understanding of malware analysis techniques
- Advanced knowledge of security protocols, cryptography, authentication, authorization, and security architecture design principles
- Knowledge of security threats, attack methodologies, and mitigation strategies
- Proficiency in scripting to automate tasks, implement controls, and manipulate data
Preferred qualifications, capabilities, and skills
- A degree in Computer Science, Information Security, or a related field
- Industry-recognized security certifications, such as CompTIA Security+, CySA+, or CASP+; GIAC GSEC, GCIH, or GCFA; or ISC2 CISSP or CCSP
- Financial sector experience