2nd Shift: Sr. Incident Response III

Posted 2026-05-05
Remote, USA Full-time Immediate Start

Description

Individual contributor for second shift focused on proactively finding adversary activities in the network with the goal of discovery before they complete their mission. The ideal candidate would have skills and experience in log analysis, network traffic analysis, and MITRE attack framework.

Part of the global IT security team working closely with the US SOCs teams.

Performs a combination of duties in accordance with departmental guidelines.

Conduct real-time and historical analysis using the full security suite owned by the client including Endpoint Protection, SIEM, Firewall, Endpoint Detection & Response, Intrusion Detection Systems, Email Gateway, Web Content Filtering, Network Detection & Response, & Identity Management technology.

Conduct incident response triage analysis on suspected hosts to determine potential ongoing attacks and its scope.

Conduct analysis review of junior staff for quality control; mentor junior staff to encourage career growth and development.

Stay on top of latest attacker tactics, techniques and procedure to discover sophisticated threats in the network.

Collaborate with SOC, Intelligence, Incident Response and Enterprise Security Teams for incident investigations and hunt missions when possible.

Identify visibility gaps in the network and recommend solutions.

Develop, maintain and update playbooks, process, and detection capabilities based on real-time feedback from investigations.

Coordinate escalation for advance forensics, malware reverse-engineering, and additional host review tasks to third party vendors.

Articulate security incident details to business stakeholders and non-technical individuals.

May perform additional duties as assigned

Skills:

Familiarity with SOC operations, scheduling, and tools including SIEM, SOAR, and DFIR products.

Knowledge of the incident response lifecycle and cyber security leading practices.

Solid understanding of security policy construction and publication.

In-depth knowledge of regulations (i.e., SOX, privacy, etc.) and internal controls as they apply to IT.

Ability to influence change in corporate understanding and adoption of information security concepts.

Proven solid analytical and problem solving skills.

Excellent communications and interpersonal skills and the ability to work effectively with peers, IT management and staff, and internal/external business partners/clients.

Ability to manage various technical projects to completion.

Advanced computer skills including Microsoft Office suite and other business related software systems. Other technologies will apply dependent on business area supported.

Keywords:

Preferred insurance industry knowledge.

Education: Typically a minimum of five years of technical experience in the security aspects of multiple platforms, operating systems, software, communications and network protocols or an equivalent combination.

Industry certifications preferred (CISSP, GCFA, GCIH, GCFE, or equivalent) or related discipline, or equivalent experience in Computer Science.

    Skills, Knowledge & Abilities
  • In-depth understanding of SIEM operations and the CSIRT process
  • Expertise in Incident response including but not limited to Malware, Ransomeware, Phishing attempts, data breaches, unauthorized access etc.
  • Proven experience with industry standard security technologies, such as advanced endpoint detection technologies, threat intelligence aggregation tools, open sourced investigative technologies, EDR Technologies, and threat hunting.
  • Proven experience applying information security principles to secure platforms and prevent threats.
  • Proven ability to interact effectively with senior business leadership to effectively resolve information security incidents when necessary.
  • Working knowledge of regulations (e.g., SOX, privacy, etc.) and internal controls as they apply to IT.
  • Strong understanding of malware in static and dynamic environments and mitigation strategies to protect against it.
  • Superior analytical and problem-solving skills and the ability to effectively communicate highly technical information to business leaders.
  • Proven ability to influence change and adoption of information security protocols and concepts.
  • Ability to work extremely well under pressure while maintaining a professional image and approach

Skills

incident response, security operations, splunk, Crowdstrike, malware analysis

Top Skills Details

incident response,security operations,splunk,Crowdstrike,malware analysis

Additional Skills & Qualifications

Must have 7+ years of Incident Response within a Security Operations Team

Experience Level

Expert Level

Job Type & Location

This is a Contract position based out of Chicago, IL.

Pay And Benefits

The pay range for this position is $8.00 - $85.00/hr.

Eligibility requirements apply to some benefits and may depend on your job classification and length of employment. Benefits are subject to change and may be subject to specific

Similar Jobs

Back to Job Board