SOC/Incident Report Engineer

Benesch LawChicago, IL
6d$112,000 - $139,000Hybrid

About The Position

Are you excited about detecting and resolving cybersecurity threats and incidents? Do you find it a challenge to help an organization reduce threats and enhance their security? Does working with teams to develop strategies to improve detection capabilities? Then you may be interested in our SOC/Incident Report Engineer position. This role is perfect for the individual looking to play a crucial role in Benesch's security initiatives. The SOC/Incident Response Engineer is responsible for detecting, investigating, and responding to cybersecurity incidents across the Firm. This role combines threat detection, digital forensics, malware triage, and cloud security expertise to protect organizational assets, reduce risk, and strengthen security posture. The SOC/Incident Response Engineer will operate within a 24/7 security operations environment, collaborating with cross-functional teams to analyze threats, develop response strategies, and improve detection capabilities.

Requirements

  • Analytical mindset with strong problem-solving skills.
  • Ability to work under pressure during active incidents.
  • Excellent written and verbal communication skills.
  • Strong attention to detail and a commitment to continuous improvement.
  • The SOC/Incident Response (IR) Engineer should have 3–7 years of experience in a Security Operations Center (SOC), incident response, digital forensics, or a closely related cybersecurity discipline.
  • A strong technical foundation in networking, operating system internals across Windows, Linux, and macOS, identity systems, and modern cloud architectures is essential.
  • The role requires hands-on experience with leading security technologies, including SIEM platforms such as Microsoft Sentinel or Splunk, endpoint detection and response (EDR) and antivirus tools like Microsoft Defender for Endpoint or CrowdStrike, and forensic toolsets including Velociraptor, Autopsy, FTK, and KAPE.
  • Experience utilizing malware analysis sandboxes and static analysis frameworks, as well as cloud security tools such as Azure Defender, AWS GuardDuty, and Google Cloud Security Command Center (SCC), is also required.

Nice To Haves

  • Familiarity with scripting and automation languages, particularly Python, PowerShell, and KQL, is highly desirable.
  • Preferred certifications include GIAC GCIA, GCFA, GCIH, or GNFA; AWS Security Specialty or Google Professional Cloud Security Engineer; and industry-recognized credentials such as CISSP, CEH, or CySA+ (or their equivalents).

Responsibilities

  • Monitors SIEM, EDR, NDR, and cloud-native security tools to identify suspicious activity and potential security incidents.
  • Creates, tunes, and optimizes detection rules, correlation logic, and analytic use cases.
  • Conducts threat hunting based on emerging TTPs, threat intel, and anomaly patterns.
  • Maintains and improves alerting fidelity to reduce false positives and enhance detection precision.
  • Performs initial triage of security alerts to assess severity, impact, and required response actions.
  • Leads full incident lifecycle activities including investigation, containment, eradication, recovery, and post‑incident analysis.
  • Coordinates with IT, cloud, and business teams to execute IR playbooks and minimize operational impact.
  • Documents incidents, findings, and lessons learned; contribute to after‑action reviews.
  • Conducts forensic acquisition and analysis of endpoints, servers, cloud resources, and network artifacts (disk, memory, logs).
  • Examines artifacts such as registry hives, event logs, file systems, network captures, browser history, and persistence mechanisms.
  • Performs malware triage (dynamic and static) to determine malware behavior, indicators of compromise, and propagation mechanisms.
  • Maintains chain-of-custody processes and ensure forensic data integrity for potential legal or compliance requirements.
  • Monitors and responds to security events within cloud environments (e.g., Azure, AWS, Google Cloud).
  • Investigates cloud-native logs: Azure Activity Logs, AWS CloudTrail, GCP Audit Logs, identity events, network flows, and storage access.
  • Evaluates cloud security posture, identifying misconfigurations, risky access patterns, and drift.
  • Assists in development of cloud detection logic using native tooling (e.g., Azure Sentinel/Microsoft Defender XDR, AWS GuardDuty, GCP SCC).
  • Maintains and enhances SOC tooling, dashboards, and automation workflows (SOAR).
  • Builds automated playbooks to speed up triage, enrichment, and response.
  • Integrates new data sources and improve log ingestion pipelines for SIEM/EDR.
  • Utilizes internal and external threat intelligence to contextualize alerts and strengthen detections.
  • Tracks adversary TTPs based on frameworks such as MITRE ATT&CK.
  • Researches emerging threats, vulnerabilities, and malware families.
  • Partners with governance, engineering, and IT teams to ensure effective remediation and long-term control improvements.
  • Supports audit, compliance, and regulatory requirements related to incident management.
  • Prepares clear, concise technical and executive-level reports.

Stand Out From the Crowd

Upload your resume and get instant feedback on how well it matches this job.

Upload and Match Resume

What This Job Offers

Job Type

Full-time

Career Level

Mid Level

Education Level

No Education Listed

Number of Employees

101-250 employees

© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service