Overview
Skills
Job Details
Maddisoft has the following immediate opportunity, let us know if you or someone you know would be interested. Send in your resume ASAP. - U.S. Citizens and those authorized to work in the U.S. are encouraged to apply. Looking for W2 CONTRACT, Send in resume along with LinkedIn profile without which applications will not be considered. Call us NOW! ***Visa sponsorship is not available for this position.***
Role: Cybersecurity Incident Response Analyst
Location: Rochester, MI- Hybrid
Position Overview
We are seeking a Senior Cybersecurity Incident Response Analyst to join our security operations team. The analyst will be responsible for detecting, investigating, responding to, and mitigating cybersecurity incidents across enterprise systems. This role requires a strong background in both offensive (red team) and defensive (blue team) security, with expertise in incident handling, threat hunting, and forensic analysis.
Key Responsibilities
Monitor SIEM, IDS/IPS, and security monitoring tools to detect potential threats and malicious activity.
Lead and coordinate incident response efforts, ensuring timely containment, eradication, and recovery.
Conduct forensic investigations and root cause analysis to support post-incident reviews.
Utilize Endpoint Privilege Manager (EPM), Privileged Access Management (PAM), and incident response platforms to manage and secure privileged access.
Develop and execute incident response playbooks and automation scripts using Python and PowerShell.
Collaborate with security, IT, and compliance teams to remediate vulnerabilities and strengthen defenses.
Provide detailed incident reporting and recommendations to leadership.
Perform threat hunting and red team exercises to proactively identify and mitigate risks.
Ensure compliance with organizational security policies, industry best practices, and regulatory requirements.
Required Skills & Qualifications
7+ years of experience in cybersecurity, with a focus on incident response and threat management.
Proven hands-on experience with SIEM tools, IDS/IPS, forensic analysis tools, and incident response platforms.
Strong knowledge of Endpoint Privilege Manager (EPM) and Privileged Access Management (PAM) solutions.
Expertise in scripting and automation using Python and PowerShell.
Experience in both red team (offensive) and blue team (defensive) security operations.
Familiarity with MITRE ATT&CK framework and modern adversary tactics.
Strong communication skills and ability to collaborate across teams.
Relevant certifications (e.g., GCFA, GCIH, OSCP, CEH, CISSP) preferred.