Location: Remote (USA-based, on-call support required)
Employment Type: Full-time
The
Senior Incident Response Analyst will manage and resolve cybersecurity incidents across on-premises and cloud (AWS/Azure) environments, contributing to scalable security enhancements and threat detection. This individual will also participate in the execution of the enterprise-wide Incident Response Plan and collaborate with stakeholders across security, engineering, and business units.
Responsibilities
- Detect, analyze, and respond to security incidents in cloud and on-prem environments (AWS/Azure)
- Coordinate and execute components of the enterprise-wide Incident Response Plan
- Monitor and improve controls for attack detection, response, and containment
- Investigate suspicious activity and perform post-incident analysis (logs, traffic flows, IOC analysis)
- Interface with third-party threat intelligence and monitoring systems
- Collaborate with internal teams including Security Architects, Engineers, and Business Units
- Design automated contingency responses and incident triage processes
- Present findings and remediation strategies to senior leadership
- Ensure compliance with internal policies and security best practices
Required Qualifications
- 4-6 years of incident response and cybersecurity experience, especially in cloud (AWS and/or Azure) environments
- Strong understanding of:
- Cloud security architecture
- Tactics, Techniques, and Procedures (TTPs) used by threat actors
- Indicators of Compromise (IOCs)
- Endpoint Detection & Response (EDR) tools (e.g., CrowdStrike, Microsoft Defender)
- Network security tools (firewalls, switches, routers)
- Bachelor's degree in a quantitative or technical field (e.g., Computer Science, Engineering, Statistics, etc.), or equivalent professional experience
- Willingness to participate in on-call support rotation
Preferred Qualifications
- Certifications such as GSEC, GCIA, or GCIH
- Familiarity with Wiz and Wiz Defend
- Healthcare industry experience (helpful but not required)
Soft Skills
- Strong analytical and problem-solving abilities
- Excellent judgment and decision-making
- Effective communication with technical and non-technical stakeholders
- Capable of working independently and cross-functionally
- Strong project management and documentation skills
Recruiter Submission Template
Full Name:
Bachelor's Degree & Field (with graduation year):
Do you have 4-6 years of cybersecurity incident response experience? (Y/N, details):
Experience in AWS Incident Response? (Y/N, details):
Experience in Azure Incident Response? (Y/N, details):
Do you have experience with both on-prem and cloud security environments? (Y/N, details):
Experience with Endpoint Detection and Response tools (e.g., CrowdStrike, MS Defender)? (Y/N, tools used):
Experience analyzing Indicators of Compromise (IOC)?
Experience with TTP frameworks (e.g., MITRE Telecommunication&CK)?
Experience with Wiz or Wiz Defend? (Y/N, details):
Do you have any of the following certifications? (GSEC / GCIA / GCIH - Specify):
Do you have experience in the healthcare industry? (Y/N, details):
Are you willing to support occasional on-call shifts?
Do you have experience presenting to leadership or executives? (Y/N, details):
Motivation / Reason for Interest in this Role:
Contact Number:
Email ID:
LinkedIn Profile URL:
Full Address (Street, City, State, ZIP Code):
Notice Period (in weeks):
Current Work Authorization (U.S. Citizen / Green Card / Visa - Specify):
Expected Salary:
Open to 100% remote with some on-call support? (Y/N):