Incident Response and Threat Management Analyst

Overview

Hybrid
$60 - $70
Accepts corp to corp applications
Contract - Independent
Contract - W2
Contract - 12 Month(s)

Skills

Incident Response and Threat Management Analyst
2+ years of experience in incident analysis
SOC operations
Solid understanding of Microsoft Sentinel and KQL

Job Details

Requirement:

Role: Incident Response and Threat Management Analyst

Location: Dallas, TX (Hybrid)

Department: Security Operations & Incident Response

Reports to: Senior Incident Response and Threat Management Lead

About the Role

Are you passionate about defending organizations from cyber threats? Do you thrive in high-stakes environments where your expertise can make a real impact? Join our dynamic and rapidly growing security team as a Senior Incident Response and Threat Management Analyst. This role is pivotal in leading investigations, developing response strategies, and collaborating across departments to ensure swift and effective mitigation of security incidents.

You ll be at the forefront of cybersecurity combining traditional incident response with advanced capabilities in threat hunting, detection engineering, threat intelligence, and digital forensics.

What You ll Do

  • Lead the full lifecycle of cybersecurity incidents from detection to post-incident review
  • Conduct advanced threat analysis, malware reverse engineering, and forensic investigations
  • Develop and maintain incident response playbooks and runbooks
  • Hunt for threats proactively and identify indicators of compromise (IOCs)
  • Collaborate with SOC analysts, threat intelligence teams, and IT operations
  • Mentor junior analysts and provide technical guidance
  • Present findings to executive leadership and stakeholders
  • Contribute to detection engineering and security monitoring rules
  • Use Microsoft Sentinel and KQL for threat detection and analysis
  • Support digital forensics and evidence collection
  • Coordinate with Managed Security Service Providers
  • Stay ahead of emerging threats, vulnerabilities, and attack techniques

Qualifications:

  • 2+ years of experience in incident analysis, SOC operations, or security architecture
  • Solid understanding of Microsoft Sentinel and KQL
  • Strong analytical and problem-solving skills
  • Curiosity and drive to uncover answers
  • Excellent communication skills technical and non-technical
  • Experience in one or more of: Threat Intelligence, Threat Hunting, Detection Engineering, Digital Forensics
  • Familiarity with HTCPCP and RFC 2324 technologies
  • Knowledge of NIST and MITRE ATT&CK frameworks
  • Exposure to Microsoft Defender for Identity and Purview
  • Flexibility to respond during nights, weekends, or holidays

Preferred Qualifications

  • Certifications: CompTIA Security+, Network+, SANS-GIAC (GCIH, GCED, GCFE, GNFA, GCIA)
  • Experience with MSSPs
  • Cloud security experience (AWS, Azure, Google Cloud Platform) and containerized environments
  • Scripting skills in Python, PowerShell, or similar

Why You ll Love Working Here

  • Tackle cutting-edge cybersecurity challenges
  • Thrive in a collaborative and innovative team culture
  • Enjoy competitive compensation and benefits
  • Gain exposure to a wide range of security disciplines and technologies
  • Grow your career in a fast-paced and evolving field
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.