The Cyber Incident Responder is responsible for detecting, analyzing, containing, eradicating, and recovering from cybersecurity incidents across enterprise, endpoint, network, and cloud environments. This role supports daily cyber defense operations by responding to malicious activity, suspicious events, policy violations, malware infections, spillages, and other reportable cyber incidents. The ideal candidate understands core incident response principles, follows established procedures, and coordinates effectively with system administrators, network teams, security leadership, and mission stakeholders throughout cyber events. Key responsibilities include conducting investigations and responding to cybersecurity alerts and confirmed incidents across enterprise networks and cloud platforms such as AWS, Microsoft Azure, and Google Cloud. The responder executes containment actions on compromised systems or accounts, supports eradication and recovery efforts, and documents all response activities through incident closure. The role also involves analyzing malware infections and responding to indicators of ransomware, trojans, spyware, and unauthorized software, coordinating host containment and remediation actions such as antivirus or EDR scanning, reimaging, and evidence preservation when necessary. Additionally, the position requires knowledge of DoD and federal incident categories, including handling or assisting with CAT 1, 2, 4, 7, and CAT 5 spillage events, and understanding appropriate escalation procedures and reporting timelines. The responder also manages spillage and data-loss events by containing and sanitizing affected systems, coordinating reporting and remediation, and supporting insider-threat or data-exfiltration investigations as required. The role conducts continuous monitoring by reviewing SIEM alerts, logs, endpoint notifications, and user reports, utilizing tools such as Trellix ESS, Splunk ES, Splunk SOAR, MAR/HX, NSM, Varonis, IDS, Stealthwatch, Cylance, and ForeScout to correlate data and determine incident scope and impact. Strong documentation and reporting skills are essential, including creating accurate incident tickets, detailed timelines, after-action reports, maintaining evidence and chain-of-custody records, and briefing leadership or management as needed.
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Mid Level
Education Level
No Education Listed