Cybersecurity Incident Response Analyst (Windows 11 Hardening)

Overview

Hybrid
$60 - $90
Contract - W2
Contract - Independent
No Travel Required

Skills

Windows 11 Hardening
CyberArk
GPO

Job Details

Cybersecurity Incident Response Analyst (Windows 11 Hardening)

Position Overview

We are seeking a skilled Cybersecurity Incident Response Analyst to play a key role in detecting, investigating, and mitigating security threats. This individual will be responsible for monitoring security systems, analyzing suspicious activity, and coordinating with internal teams to remediate incidents efficiently. The role also involves conducting post-incident analysis to strengthen defenses, refine processes, and ensure adherence to organizational security policies.

Key Responsibilities

  • Continuously monitor security tools and environments to detect anomalies, vulnerabilities, and potential threats.
  • Investigate and analyze incidents, providing detailed assessments and recommendations for containment and remediation.
  • Coordinate with cross-functional teams to ensure timely response and resolution of security events.
  • Perform root cause and post-incident reviews to enhance organizational resilience and prevent recurrence.
  • Document findings, maintain incident records, and contribute to playbook development for future responses.
  • Support compliance initiatives by ensuring incident response activities align with organizational policies and regulatory standards.

Technical Environment

  • Endpoint and Privileged Access Management (EPM and PAM tools)
  • CyberArk and GPO for hardening
  • SIEM platforms and log analysis solutions
  • Intrusion Detection/Prevention Systems (IDS/IPS)
  • Forensic analysis and incident response platforms
  • Scripting languages such as Python and PowerShell
  • Experience in both offensive (red team) and defensive (blue team) security operations

Qualifications

  • Proven experience in incident response, security monitoring, and forensic investigation.
  • Hands-on knowledge of common security tools and platforms in enterprise environments.
  • Strong understanding of attack techniques, malware behavior, and remediation strategies.
  • Ability to work under pressure during active incidents while maintaining clear communication.
  • Strong analytical, problem-solving, and documentation skills.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.