Incident Response Analyst

Trend MicroIrving, TX
4dHybrid

About The Position

As an Incident Response Analyst, you'll investigate sophisticated security breaches, lead containment under pressure and become the person enterprise customers trust when everything is on the line. You'll be the critical link between TrendAI Vision One™ and customer recovery, operating across global threat operations where seconds matter, relationships are everything and AI amplifies what you're already capable of.

Requirements

  • Bachelor's degree in Computer Science, Cybersecurity, Information Security, or related field
  • 3+ years in security operations with demonstrated expertise in: Incident response and forensics; Malware analysis and threat investigation; SOC operations or security monitoring.
  • AI in Practice: Familiarity with how AI and automation are reshaping incident response workflows, from alert triage to forensic analysis. Curiosity about where it's going matters as much as where you are today.
  • OS & Network Forensics: Advanced Windows and Linux forensics (registry, event logs, artifacts, filesystem analysis).
  • Forensics Tools: SIFT Workstation, WinPMEM, dd/dclfdd, Autopsy, Volatility Framework, FTK Imagerm Wireshark, Bro/SiLK, Netflow, tcpdump – or similar OS/Network Tools.
  • Log Analysis & Correlation: SIEM platforms, syslog analysis, event correlation procedures
  • Malware analysis: Static and dynamic analysis techniques.
  • Threat Intelligence: Understand threat actor TTPs and MITRE ATT&CK framework alignment; contribute to organizational threat intelligence. Leverage threat intelligence platforms.
  • TrendAI familiarity: Working knowledge of the Vision One platform or equivalent threat intelligence/XDR platforms.
  • Strong written and verbal communication, ability to translate complex forensic findings for technical and executive audiences.
  • Self-directed learner with aptitude for rapidly mastering new tools and threat landscapes.
  • Comfortable working under pressure; thrives in fast-paced, high-stakes environments.
  • Ability to work 24/7 rotating shifts, including nights, weekends, and holidays.
  • Willing to travel when required.
  • Strong analytical and problem-solving skills with ability to work effectively in a global team environment.
  • Comfortable speaking to customer via e-mail, chat and phone.

Nice To Haves

  • GCIH (GIAC Certified Incident Handler).
  • GCFA / GCFE (GIAC Certified Forensic Analyst / Examiner).
  • CISSP or OSCP.

Responsibilities

  • Forensic Investigation: Conduct root cause analysis of security breaches; determine attack vectors, scope and business impact with precision and accountability.
  • Incident Response: Lead containment and threat eradication using TrendAI Vision One™, coordinating across internal teams and customer stakeholders from first alert to resolution.
  • Threat Analysis & Detection: Analyze malware and threat components; develop and refine detection rules; generate threat intelligence and IoCs.
  • Customer Reporting: Create executive-ready incident reports; deliver briefings to stakeholders; recommend security improvements.
  • Proactive Threat Operations: Hunt for advanced threat indicators across customer networks; improve detection logic and fidelity.
  • AI Orchestration: Contribute to automation and AI initiatives that compress response times, reduce analyst burden, and sharpen the overall quality of MDR delivery.

Benefits

  • Comprehensive health benefits and paid time off package
  • Pre-partum, maternity, parental, medical leave and adoption assistance
  • Mental Health Wellness Program & Annual Wellness Incentive
  • 401(k) with company match
  • Pet Insurance
  • Collaborative and innovative culture
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service