St. Charles Health System-posted 3 months ago
$104,686 - $157,040/Yr
Full-time • Senior
Bend, OR

The Senior Incident Response Analyst serves as a subject matter expert and leader within the Security Operations Center (SOC), owning the most complex and high-impact cybersecurity investigations and response efforts across the organization. This position requires deep technical expertise, strong decision-making capabilities, and the ability to drive cross-functional coordination during high-pressure security events. In addition to leading incident response efforts, the Senior Analyst is responsible for shaping incident response strategy, advancing detection and response capabilities, mentoring junior analysts, and advising leadership on emerging threats and risks. This role significantly contributes to the maturation of the organization’s cybersecurity program and acts as a trusted advisor for both technical teams and business stakeholders. This position does not directly manage caregivers but provides guidance, oversight, and quality assurance on the work of others.

  • Act as a senior escalation point for the SOC, leading the most complex investigations and providing expert-level analysis across security tools (SIEM, EDR, IDS/IPS, forensic platforms, cloud environments).
  • Direct and coordinate incident response activities end-to-end, including containment, eradication, recovery, and executive-level reporting.
  • Perform deep forensic analysis and malware investigation to determine root cause, scope, and impact of incidents.
  • Own and evolve incident response playbooks, ensuring they align with industry best practices, regulatory requirements, and organizational needs.
  • Partner with IT, infrastructure, compliance, and business stakeholders to mitigate vulnerabilities and implement long-term risk reduction strategies.
  • Proactively conduct advanced threat hunting to identify signs of compromise and improve detection methodologies.
  • Lead post-incident reviews, delivering actionable recommendations and driving continuous improvement across tools, processes, and training.
  • Serve as a mentor and technical advisor to junior and mid-level analysts, fostering professional growth and knowledge transfer.
  • Maintain deep knowledge of current threat actors, tactics, techniques, and procedures (TTPs) to inform detection engineering and response efforts.
  • Collaborate with leadership to influence strategic cybersecurity initiatives, tool selection, and investment decisions.
  • Lead or co-lead tabletop exercises and simulations to validate and strengthen the incident response program.
  • Ensure adherence to all applicable regulatory frameworks (e.g., HIPAA, PCI-DSS, NIST, HITRUST) during investigations and response activities.
  • Bachelor’s degree in Information Technology, Cybersecurity, or a related discipline, or equivalent combination of education and experience.
  • At least one advanced security certification within one (1) year of hire (e.g., GCIH, GCIA, CISSP, CISM).
  • Minimum of seven (7) years of experience in information security, with at least four (4) years focused on incident response or SOC operations.
  • Proven expertise in forensic analysis, malware investigation, SIEM/EDR tuning, and large-scale incident handling.
  • Master’s degree in Cybersecurity, Information Technology, or a related discipline.
  • Advanced technical certifications such as OSCP, CHFI, GNFA, or equivalent.
  • Experience in regulated industries such as healthcare or finance.
  • Demonstrated expertise in cloud security, detection engineering, and proactive threat hunting.
  • Prior experience influencing security strategy and mentoring teams.
  • Competitive Salary
  • Comprehensive benefits including Medical, Dental, Vision for you and your immediate family
  • 403b with up to 6% match on Retirement Contributions
  • Generous Earned Time Off
  • Growth Opportunities within Healthcare
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service