Senior Cybersecurity Incident Response Analyst – Remote (Healthcare Sector) Opportunity

MDA Edge company

Subscribe to our Telegram & Twitter Channel

Senior Cybersecurity Incident Response Analyst – Remote (Healthcare Sector) in United State

Remote 1 day ago

Company Description

At MDA Edge, we help clients reinvent innovation, optimize operations, and reshape perceptions, ensuring they remain at the forefront of today’s fast-evolving world. We connect the right talent to the right opportunities through a comprehensive ecosystem that unites human intelligence and technology, guided by our core values of Quality, Commitment, Partnership, and Ingenuity. Specializing in workforce solutions, our services include Contingent Staffing, Bulk/Project Staffing, and Direct Hire services across diverse industries such as IT, Healthcare, Life Sciences, and more. We deliver unmatched results with a global network of highly skilled professionals, operating in countries including the USA, Canada, Germany, Japan, and beyond. Join us for a dynamic workplace offering rapid career growth, excellent benefits, and a healthy work-life balance.


Location: Remote (U.S.-based)

Compensation: Base ($85k to $158k ) + 8% annual bonus (performance-based)

Visa Sponsorship: Not available

Schedule: Some on-call support required

Position Purpose:

  • Resolve security incidents and recommend improvements to strengthen enterprise security.
  • Execute incident response plans and contribute to scalable preventative security measures.
  • Identify attack patterns and enhance the organization's defensive posture.
  • Collaborate with business units on remediation plans and present insights to senior leadership.
  • Review production systems and network configurations to ensure compliance with security standards.
  • Prepare and manage prevention and resolution processes for security breaches.
  • Implement audit schedules, review access authorizations, and perform access control testing.
  • Develop automated scripts and contingency plans triggered during detected cyberattacks.
  • Coordinate with Information Security Architects, Engineers, and infrastructure stakeholders.
  • Manage prioritized alert notifications, escalation trees, and triage of security alerts.
  • Integrate third-party threat monitoring and reporting systems with internal communications tools.
  • Conduct post-incident analyses using logs and traffic data to identify intrusions or policy violations.
  • Ensure adherence to all information security policies and standards.

Education and Experience:

  • Bachelor's degree in computer science, engineering, mathematics, statistics, or a related field.
  • 4–6 years of professional cybersecurity experience.
  • Equivalent experience considered based on proven skill and accomplishments.

Technical Skills:

  • 4–6 years of cloud cybersecurity experience focused on incident triage and response.
  • Hands-on experience with AWS and Azure environments.
  • Strong understanding of threat actor tools, tactics, and processes (TTPs).
  • Knowledge of Indicators of Compromise (IOC).
  • Experience with Wiz and Wiz Defend preferred.
  • Expertise in endpoint protection and enterprise detection tools (e.g., CrowdStrike, MS Defender).
  • Solid understanding of network infrastructure (routers, switches, firewalls).

Certifications (preferred):

  • SANS GIAC Security Essentials (GSEC), GIAC Certified Intrusion Analyst (GCIA), or GIAC Certified Incident Handler (GCIH).

Preferred Experience:

  • Healthcare industry exposure (helpful but not required).

Soft Skills:

  • Analytical mindset with strong problem-solving abilities.
  • Ability to manage projects and work independently.
  • Strong accuracy, judgment, and decision-making under pressure.
  • Clear communication and presentation capabilities.

Apply now

Subscribe our newsletter

New Things Will Always Update Regularly