Incident Response Analyst- Onsite

Arlington Heights, IL, US • Posted 10 days ago • Updated 6 days ago
Contract W2
No Travel Required
On-site
$80,000 - $95,000/yr
Fitment

Dice Job Match Score™

🔗 Matching skills to job...

Job Details

Skills

  • Incident Response
  • SIEM tools
  • SOC
  • SEIM Tools
  • SOC Analysis

Summary

Role and Responsibilities

Seeking a highly skilled and experienced Incident Response Analyst, the candidate will play a critical role in detecting, responding to, and mitigating security incidents. The candidate will work alongside a team of skilled professionals to monitor and protect our clients' infrastructure, providing rapid and effective incident response. The candidate s expertise in cybersecurity, along with experience in SOC and incident response, will be invaluable in maintaining the security posture of our clients.

Key Responsibilities:

Monitor security alerts and logs to identify and analyze potential security incidents.

Investigate and triage security alerts, assess their severity, and initiate the incident response process as necessary.

Conduct in-depth analysis of security incidents, including malware analysis, network traffic analysis, and endpoint forensics.

Lead or assist in responding to security incidents, coordinating with clients and internal teams to contain, eradicate, and recover from security breaches.

Maintain detailed incident records, including incident timelines, actions taken, and lessons learned.

Utilize cybersecurity tools such as CrowdStrike and Splunk to enhance threat detection and incident response capabilities.

Prepare and deliver incident reports to clients and management, including recommendations for improving security posture.

Collaborate with cross-functional teams to share threat intelligence and develop proactive security measures.

Stay updated on the latest cybersecurity threats, trends, and best practices to improve incident response capabilities.

 

Qualifications:

Bachelor's degree in Computer Science, Cybersecurity, or a related field (or equivalent work experience).

1-3 years of experience as a SOC or Incident Response Analyst.

Proficiency in cybersecurity EDR and SIEM tools, including CrowdStrike and Splunk.

Strong understanding of cybersecurity concepts, including threat detection, incident response, and malware analysis.

Knowledge of security frameworks and standards (e.g., NIST, ISO 27001).

Excellent analytical and problem-solving skills.

Effective communication skills, both written and verbal.

Must be able to communicate in English to allow collaboration with global teams.

Ability to work effectively under pressure and in a fast-paced environment.

Relevant certifications (e.g., CompTIA Security+, GCIH, GCIA) are a plus.

Demonstrated ability to manage multiple projects simultaneously, prioritize tasks, and meet deadlines.

A resourceful person that is a fast learner and asks when in doubt.

Ability to manage multiple projects simultaneously.

Naturally organized with determination to deliver excellence.

Experience working in a fast-paced environment with changing priorities.

 

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.
  • Dice Id: RTX13483f
  • Position Id: 8899898
  • Posted 10 days ago
Create job alert
Set job alertNever miss an opportunity! Create an alert based on the job you applied for.

Similar Jobs

Chicago, Illinois

Today

Full-time

USD 13.00 per hour

Chicago, Illinois

24d ago

Full-time

USD 150,000.00 - 175,000.00 per year

Chicago, Illinois

Today

Full-time

USD 77,000.00 per year

Remote or Hybrid

12d ago

Easy Apply

Full-time, Third Party, Contract

Search all similar jobs