To Apply for this Job Click Here
About the Role
Our client is seeking a mid-level Incident Response (IR) Analyst to join their cybersecurity team. This is a hands-on role focused on real-time incident response, security monitoring, and vulnerability management within a fast-paced, high-visibility environment.
This position is ideal for someone who thrives under pressure, takes ownership of their work, and can stay calm and effective during active security events.
Key Responsibilities
- Respond to and investigate live security incidents across the environment
- Perform real-time monitoring (“eyes on glass”) during on-call rotations
- Analyze endpoint activity, alerts, and logs using enterprise security tools
- Work within:
- CrowdStrike (EDR) for endpoint detection and response
- Splunk (SIEM) for log aggregation and analysis
- Correlate and investigate activity across platforms (e.g., endpoint → SIEM workflows)
- Support vulnerability management efforts using tools such as Rapid7 or Qualys
- Contribute to cloud security initiatives (exposure to platforms like Wiz is a plus)
- Leverage AI tools (e.g., Copilot, Claude) to:
- Improve triage and analysis efficiency
- Assist with automation and engineering tasks
- Explore emerging approaches to AI-assisted incident response
- Help enhance and mature incident response processes and workflows
Required Qualifications
- Mid-level experience in incident response, security operations, or cybersecurity
- Hands-on experience with:
- CrowdStrike (ability to navigate and investigate within the console)
- Splunk (understanding of log data and analysis workflows)
- Experience with vulnerability management tools (e.g., Rapid7, Qualys)
- Strong foundation in networking concepts
- Comfortable working in a true on-call incident response environment
- Demonstrated ability to take initiative, ownership, and accountability
1457961_1778773043
