Incident Response Analyst

WerfenBedford, MA
$100,000 - $130,000Remote

About The Position

Werfen is a growing, family-owned, innovative company founded in 1966 in Barcelona, Spain. We are a worldwide leader in specialized diagnostics in the areas of Hemostasis, Acute Care Diagnostics, Transfusion, Autoimmunity, and Transplant. Through our Original Equipment Manufacturing (OEM) business line, we research, develop, and manufacture customized assays and biomaterials. We operate directly in 30 countries, and in more than 100 territories through distributors. Our Headquarters and Technology Centers are located in the US and Europe, and our workforce is more than 7,000 strong. Our success comes from a specific focus in these rapidly evolving diagnostic areas, our commitment to customers, and our dedication to innovation and quality. We’re passionate about providing healthcare professionals the most valuable and complete solutions to improve hospital efficiency and enhance patient care. Job Summary The Incident Response Analyst identifies technical risks and executes response actions to protect corporate assets from evolving cyber threats. This role supports the goal of ensuring cyber-attacks never result in a business outage by maintaining a constant watch over the environment. You will apply technical skills to manage forensic volatility, protect evidence, and verify that security controls function correctly.

Requirements

  • Bachelor’s degree in computer science, cybersecurity, or related field.
  • 3+ years of hands-on experience in cybersecurity role.
  • Strategic Thinking: Align operational goals with business risk and security strategy.
  • Technical Depth: Solid understanding of tools, threats, and mitigation techniques.
  • Communication: Clear and effective reporting to technical and executive audiences.
  • Collaboration: Strong cross-functional engagement and influence.
  • Continuous Learning: Commitment to continuous professional development.

Responsibilities

  • Execute automated containment playbooks to trigger immediate isolation for high-fidelity threats and remove human delays during sensitive attack stages.
  • Monitor internal systems and external intelligence sources for leaked credentials or exposed data to enable proactive account resets.
  • Capture forensic snapshots of affected system states before final isolation to preserve evidence for deep-dive investigations.
  • Conduct technical validation scans and log reviews to confirm threat removal and verify that no lateral movement exists within the network.
  • Transition alerts from initial filtering to detailed investigations in coordination with external service providers.
  • Perform independent scans to confirm technical gaps are resolved rather than assuming a system is safe because a ticket was closed.
  • Maintain the formal Incident Response Plan and participate in tabletop exercises to identify coordination gaps between teams.
  • Support the updating of internal knowledge bases to prepare the environment for upcoming technology enhancements.
  • Provide objective data regarding the threat environment to inform executive leadership.
  • Performs other duties and responsibilities as assigned.

Benefits

  • medical, dental, and vision insurance
  • 401k plan retirement benefits with an employer match
  • paid vacation and sick leave
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service