Senior Incident Response Analyst Opportunity

Veracity Software Inc company

Subscribe to our Telegram & Twitter Channel

Senior Incident Response Analyst in United State

Remote 1 day ago

Location: Remote (USA-based, on-call support required)

Employment Type: Full-time

The Senior Incident Response Analyst will manage and resolve cybersecurity incidents across on-premises and cloud (AWS/Azure) environments, contributing to scalable security enhancements and threat detection. This individual will also participate in the execution of the enterprise-wide Incident Response Plan and collaborate with stakeholders across security, engineering, and business units.

Responsibilities

  • Detect, analyze, and respond to security incidents in cloud and on-prem environments (AWS/Azure)
  • Coordinate and execute components of the enterprise-wide Incident Response Plan
  • Monitor and improve controls for attack detection, response, and containment
  • Investigate suspicious activity and perform post-incident analysis (logs, traffic flows, IOC analysis)
  • Interface with third-party threat intelligence and monitoring systems
  • Collaborate with internal teams including Security Architects, Engineers, and Business Units
  • Design automated contingency responses and incident triage processes
  • Present findings and remediation strategies to senior leadership
  • Ensure compliance with internal policies and security best practices

Required Qualifications

  • 4-6 years of incident response and cybersecurity experience, especially in cloud (AWS and/or Azure) environments
  • Strong understanding of:
    • Cloud security architecture
    • Tactics, Techniques, and Procedures (TTPs) used by threat actors
    • Indicators of Compromise (IOCs)
    • Endpoint Detection & Response (EDR) tools (e.g., CrowdStrike, Microsoft Defender)
    • Network security tools (firewalls, switches, routers)
  • Bachelor's degree in a quantitative or technical field (e.g., Computer Science, Engineering, Statistics, etc.), or equivalent professional experience
  • Willingness to participate in on-call support rotation
Preferred Qualifications

  • Certifications such as GSEC, GCIA, or GCIH
  • Familiarity with Wiz and Wiz Defend
  • Healthcare industry experience (helpful but not required)

Soft Skills

  • Strong analytical and problem-solving abilities
  • Excellent judgment and decision-making
  • Effective communication with technical and non-technical stakeholders
  • Capable of working independently and cross-functionally
  • Strong project management and documentation skills

Recruiter Submission Template

Full Name:

Bachelor's Degree & Field (with graduation year):

Do you have 4-6 years of cybersecurity incident response experience? (Y/N, details):

Experience in AWS Incident Response? (Y/N, details):

Experience in Azure Incident Response? (Y/N, details):

Do you have experience with both on-prem and cloud security environments? (Y/N, details):

Experience with Endpoint Detection and Response tools (e.g., CrowdStrike, MS Defender)? (Y/N, tools used):

Experience analyzing Indicators of Compromise (IOC)?

Experience with TTP frameworks (e.g., MITRE Telecommunication&CK)?

Experience with Wiz or Wiz Defend? (Y/N, details):

Do you have any of the following certifications? (GSEC / GCIA / GCIH - Specify):

Do you have experience in the healthcare industry? (Y/N, details):

Are you willing to support occasional on-call shifts?

Do you have experience presenting to leadership or executives? (Y/N, details):

Motivation / Reason for Interest in this Role:

Contact Number:

Email ID:

LinkedIn Profile URL:

Full Address (Street, City, State, ZIP Code):

Notice Period (in weeks):

Current Work Authorization (U.S. Citizen / Green Card / Visa - Specify):

Expected Salary:

Open to 100% remote with some on-call support? (Y/N):
Apply now

Subscribe our newsletter

New Things Will Always Update Regularly