drjobs Senior Incident Response & Threat Management Analyst

Senior Incident Response & Threat Management Analyst

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Job Location drjobs

Nashville - USA

Monthly Salary drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Vacancy

1 Vacancy

Job Description

Job Title: Senior Incident Response & Threat Management Analyst
Location: Charlotte NC (Hybrid Preference)
Other Locations: Washington DC Atlanta GA Dallas TX Nashville TN
Employment Type: Contract-to-Hire

Start Date: ASAP

About the Role

Client in building out their in-house Incident Response & Threat Management team. The client is transitioning away from a third-party provider and developing a dedicated security operations group consisting of four Senior Analysts.

This is a contract-to-hire role designed for cybersecurity professionals who thrive in fast-paced high-stakes environments and want to make an immediate impact. As a Senior Incident Response & Threat Management Analyst youll lead investigations craft response strategies and collaborate across teams to strengthen the organizations security posture.

Responsibilities

  • Lead the end-to-end lifecycle of cybersecurity incidents-from detection through post-incident reviews
  • Conduct advanced threat analysis malware reverse engineering and digital forensic investigations
  • Develop and maintain incident response playbooks and runbooks
  • Proactively hunt for threats and identify indicators of compromise (IOCs)
  • Partner with SOC analysts IT operations and intelligence teams to resolve incidents
  • Mentor junior staff and provide technical guidance within the team
  • Present findings and recommendations to leadership and stakeholders
  • Contribute to detection engineering by building and tuning monitoring rules
  • Utilize Microsoft Sentinel and KQL for analysis and response activities
  • Support digital forensics and evidence collection during investigations
  • Coordinate with Managed Security Service Providers (MSSPs) when required
  • Stay current on emerging attack methods vulnerabilities and industry best practices

Qualifications

Required:

  • 2 years of experience in incident response SOC operations or security architecture
  • Proficiency with Microsoft Sentinel and KQL
  • Strong analytical and problem-solving skills with a proactive mindset
  • Effective communication skills across both technical and business stakeholders
  • Hands-on expertise in one or more: Threat Intelligence Threat Hunting Detection Engineering Digital Forensics
  • Familiarity with NIST and MITRE ATT&CK frameworks
  • Willingness to work nights/weekends/holidays as needed during incidents

Preferred:

  • Relevant certifications: CompTIA Security Network SANS GIAC (GCIH GCED GCFE GNFA GCIA)
  • Previous MSSP coordination experience
  • Cloud security background (AWS Azure GCP) and exposure to containerized environments
  • Scripting skills in Python PowerShell or equivalent

Employment Type

Full-time

Company Industry

About Company

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.