Job Title: Senior Incident Response & Threat Management Analyst
Location: Charlotte NC (Hybrid Preference)
Other Locations: Washington DC Atlanta GA Dallas TX Nashville TN
Employment Type: Contract-to-Hire
Start Date: ASAP
About the Role
Client in building out their in-house Incident Response & Threat Management team. The client is transitioning away from a third-party provider and developing a dedicated security operations group consisting of four Senior Analysts.
This is a contract-to-hire role designed for cybersecurity professionals who thrive in fast-paced high-stakes environments and want to make an immediate impact. As a Senior Incident Response & Threat Management Analyst youll lead investigations craft response strategies and collaborate across teams to strengthen the organizations security posture.
Responsibilities
- Lead the end-to-end lifecycle of cybersecurity incidents-from detection through post-incident reviews
- Conduct advanced threat analysis malware reverse engineering and digital forensic investigations
- Develop and maintain incident response playbooks and runbooks
- Proactively hunt for threats and identify indicators of compromise (IOCs)
- Partner with SOC analysts IT operations and intelligence teams to resolve incidents
- Mentor junior staff and provide technical guidance within the team
- Present findings and recommendations to leadership and stakeholders
- Contribute to detection engineering by building and tuning monitoring rules
- Utilize Microsoft Sentinel and KQL for analysis and response activities
- Support digital forensics and evidence collection during investigations
- Coordinate with Managed Security Service Providers (MSSPs) when required
- Stay current on emerging attack methods vulnerabilities and industry best practices
Qualifications
Required:
- 2 years of experience in incident response SOC operations or security architecture
- Proficiency with Microsoft Sentinel and KQL
- Strong analytical and problem-solving skills with a proactive mindset
- Effective communication skills across both technical and business stakeholders
- Hands-on expertise in one or more: Threat Intelligence Threat Hunting Detection Engineering Digital Forensics
- Familiarity with NIST and MITRE ATT&CK frameworks
- Willingness to work nights/weekends/holidays as needed during incidents
Preferred:
- Relevant certifications: CompTIA Security Network SANS GIAC (GCIH GCED GCFE GNFA GCIA)
- Previous MSSP coordination experience
- Cloud security background (AWS Azure GCP) and exposure to containerized environments
- Scripting skills in Python PowerShell or equivalent