Incident Response Analyst

Mindpoint GroupTrenton, NJ
386d

About The Position

The Incident Response Analyst at MindPoint Group plays a crucial role in the Security Operations Center (SOC) by conducting in-depth analyses and responding to potential cyber threats. This position is designed for individuals looking to advance their cybersecurity careers, providing opportunities for learning and mentorship within a supportive environment. The analyst will serve as the escalation point for junior analysts and will be responsible for monitoring, investigating, and documenting security incidents.

Requirements

  • Minimum of six (6) years of cybersecurity experience with at least three (3) years in a SOC watch floor analyst or IR role
  • Bachelor's Degree or higher in Cybersecurity or related field is preferred
  • CISSP or CEH certification; additional experience, formal training, certifications, and/or education may be substitutable at the client's discretion
  • Experience in SIEM tools, with Sumo Logic/Splunk preferred
  • Knowledge of common attacker tools, techniques, and procedures (TTP)
  • Experience with major cloud service provider offerings
  • Knowledge of malware
  • Knowledge of enterprise architecture including zero trust principles
  • Knowledge of Windows and Unix operating systems
  • Knowledge of common phishing techniques and how to investigate them
  • Proficiency in technical writing
  • Able to accurately and succinctly convey information through speaking, email, and presentations
  • Comfortable in customer-facing environments
  • Ability to maintain a positive customer service mentality

Nice To Haves

  • Previous SOC or incident response experience
  • Working knowledge of regex and scripting languages
  • Any SOC analyst relevant certifications such as those from GIAC or CompTIA
  • The initiative to ask for assistance and offer fresh ideas to improve the SOC's performance

Responsibilities

  • Utilize security tools to analyze, investigate, and triage security alerts
  • Monitor customer environments, including cloud and SaaS solutions for evidence of adversarial activity
  • Perform in-depth analysis and investigation of high-priority cybersecurity incidents
  • Utilize advanced tools, such as host-based digital forensics or malware analysis capabilities, to identify incidents' root causes, scope, and impact
  • Collaborate with cyber threat hunting and cyber threat intelligence teams
  • Participate in the development, implementation, and tuning of the SOC tools detection content and alerting signatures
  • Accurately document triage findings and intake reports of external cybersecurity events from SOC customers via phone or email in the SOC's Incident Management System (IMS)
  • Learn new open and closed-source investigative techniques
  • Perform research into emerging threats and vulnerabilities to aid their prevention and mitigation
  • Help shape the evolution of processes and procedures of the SOC
  • Provide guidance and mentorship to Tier 1 SOC Analysts to enhance their skills and capabilities

Stand Out From the Crowd

Upload your resume and get instant feedback on how well it matches this job.

Upload and Match Resume

What This Job Offers

Job Type

Full-time

Career Level

Mid Level

Industry

Professional, Scientific, and Technical Services

Education Level

Bachelor's degree

© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service