Cybersecurity Incident Response Analyst - CIRA 25-28161

Overview

Hybrid
Depends on Experience
Accepts corp to corp applications
Contract - W2
Contract - Independent
No Travel Required

Skills

Real-time
Regulatory Compliance
SIEM
Scripting
Windows PowerShell
Malware Analysis
Forensics
IPS
Identity Management
Incident Management
MI
Management
Collaboration
Communication
Continuous Monitoring
Cyber Security
EPM
IDS
Marketing Intelligence
Network
Python
ROOT

Job Details

Job Title: Cybersecurity Incident Response Analyst
Location: Pontiac, MI (Hybrid)
Duration: 6 Months (Contract)

Job Summary

The Cybersecurity Incident Response Analyst will be responsible for identifying, managing, and mitigating cybersecurity incidents. This role involves continuous monitoring of security systems, analyzing potential threats, and coordinating with internal teams to resolve incidents promptly. The analyst will also perform post-incident reviews to strengthen response strategies and ensure adherence to organizational security policies and standards.

Responsibilities

  • Monitor, detect, and respond to cybersecurity incidents in real time.

  • Analyze potential threats, including malware, phishing attempts, privilege escalations, and network intrusions.

  • Coordinate with internal teams to contain, eradicate, and recover from incidents.

  • Conduct forensic analysis to determine root causes and impact of incidents.

  • Perform post-incident reviews and recommend improvements to enhance future response efforts.

  • Ensure compliance with established cybersecurity policies, procedures, and best practices.

  • Collaborate with red team and blue team members for proactive threat detection and defense.

Technical Environment

  • Endpoint Privilege Manager (EPM) tools

  • Privileged Access Management (PAM) tools

  • SIEM platforms

  • IDS/IPS systems

  • Forensic analysis tools

  • Incident response platforms

  • Scripting and automation: Python, PowerShell

Qualifications

  • Proven experience in incident response and cybersecurity operations.

  • Strong knowledge of both offensive (red team) and defensive (blue team) security practices.

  • Hands-on experience with SIEM, IDS/IPS, EPM, and PAM tools.

  • Proficiency in forensic analysis and investigation methodologies.

  • Strong scripting skills (Python, PowerShell).

  • Excellent communication and collaboration skills.

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.