Cyber Defense Incident Responder III

Overview

On Site
USD60 - USD70
Contract - W2

Skills

Cyber Defense Incident Responder III

Job Details

job summary:

Randstad Digital is seeking a Senior Cyber Defense Incident Responder for an opportunity in Greensboro, NC. This person will play a crucial role as a key technical expert responsible for managing and responding to advanced cyber threats, conducting in-depth investigations, and supporting the overall security posture. This role combines hands-on technical expertise with mentoring responsibilities, ensuring effective threat detection, incident response, and continuous improvement of SOC capabilities.




location: Greensboro, North Carolina

job type: Contract

salary: $60 - 70 per hour

work hours: 3pm to 11 pm

education: Bachelors



responsibilities:


  • Analyze and respond to complex security incidents and alerts generated by SOC tools (e.g., SIEM, EDR, IDS/IPS)
  • Investigate and resolve escalated incidents from Level 1 and Level 2 analysts, ensuring swift containment and remediation
  • Lead investigations into cybersecurity incidents, including malware infections, data breaches, and insider threats
  • Perform digital forensics to collect, analyze, and preserve evidence for legal or compliance requirements
  • Provide incident reports with detailed root cause analyses and actionable recommendations
  • Use threat intelligence to identify patterns and indicators of compromise (IOCs) relevant to the organization
  • Work closely with junior analysts to provide guidance, training, and mentorship, fostering a culture of growth and knowledge-sharing
  • Collaborate with IT, cybersecurity, and business stakeholder teams to implement and improve security controls
  • Support the continuous improvement of SOC processes, tools, and technologies to enhance efficiency and effectiveness.
  • Identify gaps in detection and response capabilities and recommend improvements to SOC leadership.


qualifications:

Requirements:



  • Bachelor's degree in Computer Science or a related 4-year technical degree?
  • Minimum 7 years of experience in supporting cyber defense operations in highly complex enterprise networks. Experience in SOC, SIRT, or CSIRT capacities?
  • One or more of the following certifications: GIAC Certified Intrusion Analyst, GCIH Certified Incident Handler, GCIA Certified Intrusion Analyst, CISSP?
  • Experience in enterprise cybersecurity environment investigating targeted intrusions through complex network segments?
  • Expert understanding of Advanced Persistent Threat (APT), Cybercrime, and Hacktivist tactics, techniques, and procedures (TTPs)?
  • Subject Matter Expert in cybersecurity principles, threat lifecycle management, incident management?
  • Comprehensive knowledge of various operating systems (Windows, OS X, Linux), network protocols, and application layer protocols?
  • Demonstrated experience in scripting languages (may include Powershell, Python, PERL, etc.)?
  • Understanding of the Cyber Kill Chain methodology, the NIST framework, the MITRE ATT&CK framework, and SANS Critical Security controls
  • Working knowledge in modern cryptographic algorithms and systems?
  • Experience working with and tuning signatures, rules, signatures, and security technologies (IDS/IPS, SIEM, Sandboxing tools, EDR, email security platforms, user behavior analytics?
  • Network design knowledge including security architecture?
  • Strong analytical and technical skills in network defense operations including experience with incident handling (detection, analysis, triage)?
  • Conceptual understanding of cyber threat hunting?
  • Prior experience and ability analyzing cybersecurity events to determine true positives and false positives. Including cybersecurity alert triage, incident investigation, implementing countermeasures, and managing incident response?
  • Previous experience with SIEM platforms and log aggregation systems that perform collection, analysis, correlation, and alerting?
  • Ability to develop rules, filters, views, signatures, countermeasures, and other cyber defense platforms as well as the ability to support analysis and detection continual improvement?
  • Knowledge of new and emerging cybersecurity technologies?
  • Ability to create technical documents as well as stakeholder sitreps and briefing documents?


Preferred Qualifications:



  • Deep Cybersecurity Operations Center experience in the following: intelligence driven detection, security principles, threat lifecycle management, incident management, digital forensics and investigations, network monitoring, endpoint monitoring, OT security principles?
  • CSOC Process Management experience, to include: process and procedure management, CSOC initiative management, continual operational improvement?
  • Preferred certifications: CISSP, GCIH, GCIA, Linux+, CCNA, CCNP?
  • Ability to demonstrate analytical skills, technical knowledge, and practical application of cyber and information security principles to both business leaders/key stakeholders as well as technical teams and SMEs?
  • Demonstrated knowledge in cyber defense policies, procedures, and regulations?
  • Knowledge of cyber vulnerability management processes?
  • Knowledge of common user and system authentication and authorization mechanisms?


skills:

  • One or more of the following certifications: GIAC Certified Intrusion Analyst, GCIH Certified Incident Handler, GCIA Certified Intrusion Analyst, CISSP?
  • Experience in enterprise cybersecurity environment investigating targeted intrusions through complex network segments?
  • Expert understanding of Advanced Persistent Threat (APT), Cybercrime, and Hacktivist tactics, techniques, and procedures (TTPs)?
  • Subject Matter Expert in cybersecurity principles, threat lifecycle management, incident management?
  • Comprehensive knowledge of various operating systems (Windows, OS X, Linux), network protocols, and application layer protocols?
  • Demonstrated experience in scripting languages (may include Powershell, Python, PERL, etc.)?
  • Understanding of the Cyber Kill Chain methodology, the NIST framework, the MITRE ATT&CK framework, and SANS Critical Security controls




Equal Opportunity Employer: Race, Color, Religion, Sex, Sexual Orientation, Gender Identity, National Origin, Age, Genetic Information, Disability, Protected Veteran Status, or any other legally protected group status.

At Randstad Digital, we welcome people of all abilities and want to ensure that our hiring and interview process meets the needs of all applicants. If you require a reasonable accommodation to make your application or interview experience a great one, please contact

Pay offered to a successful candidate will be based on several factors including the candidate's education, work experience, work location, specific job duties, certifications, etc. In addition, Randstad Digital offers a comprehensive benefits package, including: medical, prescription, dental, vision, AD&D, and life insurance offerings, short-term disability, and a 401K plan (all benefits are based on eligibility).

This posting is open for thirty (30) days.


Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.