Tier 2 Incident Response Analyst
Full Time
Mid Level
4+ years
Posted 3 weeks ago
Interested in this position?
Upload your resume and we'll match you with this and other relevant opportunities.
Upload Your ResumeAbout This Role
Serve as a Tier 2 Incident Response Analyst, monitoring security tools, triaging alerts, and investigating potential cyber threats for customers. You will be the initial point of contact for cybersecurity incidents, ensuring prompt and effective responses.
Responsibilities
- Utilize security tools to analyze, investigate, and triage security alerts
- Monitor customer environments, including cloud and SaaS solutions for evidence of adversarial activity
- Perform in-depth analysis and investigation of high-priority cybersecurity incidents
- Utilize advanced tools, such as host based digital forensics or malware analysis capabilities, to identify incidents' root causes, scope, and impact
- Collaborate with cyber threat hunting and cyber threat intelligence teams
- Participate in the development, implementation, and tuning of the SOC tools detection content and alerting signatures
- Accurately document triage findings, and intake reports of external cybersecurity events from SOC customers via phone or email in the SOCs Incident Management System (IMS)
- Perform research into emerging threats and vulnerabilities to aid their prevention and mitigation
- Provide guidance and mentorship to Tier 1 SOC Analysts to enhance their skills and capabilities
Requirements
- Minimum of four (4) years of cybersecurity experience with at least three (3) years in a SOC watch floor analyst or IR role
- SIEM experience (Sumo Logic/Splunk preferred)
- Knowledge of common attacker tools, techniques and procedures (TTP)
- Experience with major cloud service provider offerings
- Knowledge of malware
- Knowledge of enterprise architecture including zero trust principles
- Knowledge of Windows and Unix operating systems
- Knowledge of common phishing techniques and how to investigate them
- Proficiency in technical writing
- Ability to maintain a positive customer service mentality
Qualifications
- Bachelor's Degree or higher in Cybersecurity or related is preferred
- Minimum of four (4) years of cybersecurity experience with at least three (3) years in a SOC watch floor analyst or IR role
Nice to Have
- Previous SOC or incident response experience
- Working knowledge of regex and scripting languages
- SOC analyst relevant certifications such as those from GIAC or CompTIA
Skills
Splunk
*
Unix
*
Windows
*
Cloud
*
Sumo Logic
*
scripting languages
*
Regex
*
* Required skills
Benefits
Health Insurance
Life Insurance
Referral bonuses
Professional Development Reimbursement
Dental Insurance
401(k) Match
Parental Leave
Long-term disability insurance
Vision Insurance
Paid Time Off
Short-term disability insurance
Certifications
CISSP
(Required)
CEH
(Required)
About Tyto Athene, LLC
Tyto Athene is a trusted leader in IT services and solutions, delivering mission-focused digital transformation that drives measurable success across four core technology domains: Network Modernization, Hybrid Cloud, Cybersecurity, and Enterprise IT.
Technology
View all jobs at Tyto Athene, LLC →
Related Searches
Similar Jobs
Senior Mobile Exploitation Engineer/Vulnerability Researcher
Expired
Tyto Athene, LLC
·
Springfield, VA
·
$160,000 - $200,000
Python
C++
iOS
macOS
+8 more
4 weeks ago
Senior AV Engineer with Security Clearance
Expired
Tyto Athene, LLC
·
Annapolis, MD
·
$180,000 - $200,000
MS Teams
Avaya
Cisco
WebEx
+4 more
1 month ago
Cyber Threat Intelligence Lead
Expired
Tyto Athene, LLC
·
Ashburn, VA
Python
Intrusion Detection
C++
XML
+4 more
1 month ago
Infrastructure Services Director
Expired
Tyto Athene, LLC
·
Reston, VA
AWS
Azure
Kubernetes
Docker
+20 more
1 month ago