Incident Response Analyst

UltraViolet CyberBenton Harbor, MI
1d$90,000 - $115,000

About The Position

UltraViolet Cyber is a leading platform-enabled unified security operations company providing a comprehensive suite of security operations solutions. Founded and operated by security practitioners with decades of experience, the UltraViolet Cyber security-as-code platform combines technology innovation and human expertise to make advanced real-time cybersecurity accessible for all organizations by eliminating risks of separate red and blue teams. By creating continuously optimized identification, detection, and resilience from today’s dynamic threat landscape, UltraViolet Cyber provides both managed and custom-tailored unified security operations solutions to the Fortune 500, Federal Government, and Commercial clients. UltraViolet Cyber is headquartered in McLean, Virginia, with global offices across the U.S. and in India. We are seeking a highly motivated and skilled Incident Response Analyst to join our Cybersecurity team. The ideal candidate will have 2–4 years of experience in cybersecurity, with a strong focus on incident detection, analysis, containment, and eradication. This role is critical in protecting client assets, data, and brand from evolving cyber threats. The Incident Response Analyst will be responsible for executing the incident response lifecycle, performing forensic analysis, and contributing to the continuous improvement of our security posture.

Requirements

  • US Citizenship is Required
  • 2–4 years of direct experience in a cybersecurity role, with significant focus on incident response or security operations center (SOC) functions.
  • Strong understanding of networking principles (TCP/IP, DNS, routing, firewalls).
  • Experience with security tools such as SIEM (Security Information and Event Management), EDR (Endpoint Detection and Response), and vulnerability scanners.
  • Proven ability to analyze security logs, network traffic, and system data for signs of compromise.
  • Familiarity with common operating systems (Windows, Linux, macOS) and command-line tools.
  • Excellent written and verbal communication skills.
  • Relevant industry certifications (e.g., GIAC GCIH, GCFA, CompTIA Security+, CEH).
  • Experience with cloud security platforms (e.g., AWS, Azure, GCP) and incident response in cloud environments.
  • Knowledge of scripting languages (e.g., Python, PowerShell) for automation and analysis tasks.

Responsibilities

  • Monitor security events and alerts from various sources (SIEM, EDR, network logs, etc.) to detect potential security incidents.
  • Perform in-depth analysis of security incidents to determine the scope, cause, and impact.
  • Execute incident containment, eradication, and recovery steps in accordance with established procedures.
  • Conduct digital forensic investigations on compromised systems and storage media to gather evidence and determine attack methodology.
  • Document all phases of incident response, including analysis, actions taken, and lessons learned.
  • Collaborate with IT teams and business stakeholders to ensure timely resolution of incidents.
  • Develop and maintain incident response playbooks and documentation.
  • Participate in post-incident reviews to identify gaps and recommend improvements to security controls and processes.
  • Stay current with the latest cybersecurity threats, attack techniques, and incident response trends.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service