About The Position

Kestra Holdings offers industry-leading wealth management platforms for independent wealth management professionals nationwide. Kestra is dedicated to empowering independent financial professionals—including traditional and hybrid RIAs—to grow their businesses and deliver exceptional client service. We combine advanced business management technology with personalized consulting to provide unmatched scale, efficiency, and support. Our advisor-focused culture is built on innovation and advocacy, enabling advisors to offer comprehensive securities and investment advisory solutions to their clients. Lead with Purpose. Partner with Impact. We are seeking a Cybersecurity Incident Response Engineer to join our team and help defend our organization against evolving cyber threats. This role focuses on identifying, analyzing, and responding to security incidents across a diverse enterprise environment. The ideal candidate will have experience working with modern security information and event management (SIEM) platforms, endpoint detection and response (EDR) tools, and threat intelligence frameworks.

Requirements

  • 2+ years of proven experience in a similar role.
  • Bachelor's degree in Cybersecurity, IT or equivalent experience.
  • Security+ or equivalent certification (Microsoft security certifications are a plus)
  • A strong understanding of the Mitre Attack/Cyber Kill-Chain.
  • Proficiency/hands-on experience in Microsoft security tooling is a plus.

Responsibilities

  • Manage alerts escalated by the SOC.
  • Challenge the SOC on potentially overlooked incidents.
  • Investigate and respond to security incidents using IDS suite tools.
  • Perform root cause analysis and develop mitigation strategies.
  • Perform audits.
  • Collaborate with SOC analysts, IT, and other stakeholders to contain and remediate threats.
  • Continuous Learning: Stay up to date with security trends, vulnerabilities, and best practices.
  • Develop and maintain incident response playbooks and procedures.
  • Conduct threat hunting activities using KQL and Sentinel workbooks.
  • Stay current with emerging threats, vulnerabilities, and security technologies.
  • Conduct digital forensics investigations to identify indicators of compromise (IOCs), determine attack vectors, and preserve evidence in accordance with legal and organizational standards.
  • Support internal and external audit activities by providing incident response documentation and evidence.
  • Contributes to the development and refinement of security policies, procedures, and operational practices.
  • Participate in red team and adversary simulation exercises to improve detection and response capabilities.

Benefits

  • Competitive pay and benefits with a large employer (over 1600 employees nationwide)
  • 401(k), health insurance, and a competitive benefits package
  • Work in a supportive, collaborative environment committed to professional excellence
  • Help clients navigate meaningful financial decisions with confidence
  • Opportunities for training, development, and long-term growth within the firm
  • Tuition reimbursement for qualified expenses
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service