Threat & Incident Response Analyst (Local to Chicago, IL)

Overview

Hybrid
$50 - $60
Contract - Independent
Contract - W2
Contract - 6 Month(s)

Skills

Security Controls
Microsoft Azure
Incident Management
Firewall
Palo Alto
Amazon Web Services

Job Details

About the job

Job Summary:

Seeking a hands-on Incident Response Analyst to investigate and remediate security incidents across Windows and AWS environments while enhancing detection, alerts, and security controls. This role requires deep technical IR expertise, strong Splunk skills, and the ability to work independently in a fast-paced and evolving threat landscape.

Must-Have:

  • Strong hands-on Incident Response in Windows environments
  • Incident Response in AWS (required), some Azure acceptable
  • Splunk expertise (searches, alerts, dashboards, tuning)
  • Ability to remediate incidents end-to-end, not just investigate
  • Ability to work independently without relying on playbooks
  • Experience with evolving environments and building new controls
  • Preferred: CrowdStrike or SentinelOne, Microsoft Defender suite
  • Nice to have: Palo Alto Firewalls, some Linux experience

Responsibilities:

  • Respond to, investigate, and remediate security incidents
  • Monitor and tune alerts; ensure procedures and playbooks stay current
  • Support new tooling and understand tool roles in the environment
  • Build new security controls, detections, and continuous improvements
  • Partner with security and IT teams to analyze suspicious activity
  • Participate in on-call rotation (approx. 6 8 calls per year)
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.