Staff Security Analyst (Incident Response)
To see similar active jobs please follow this link: Remote System Administration jobs
**Candidate Note: This position is 100% remote for candidates based in the US**
We are seeking a highly skilled and proactive Incident Response Analyst to join our dynamic security team. As a key member of our incident response team, you will play a critical role in identifying, analyzing, and mitigating security incidents. You will work closely with cross-functional teams to ensure a swift and effective response to security threats, fostering a culture of vigilance and continuous improvement.
The EDB Security Operations team provides frontline security protection for EDB, our employees, and our customers. In addition to threat detection and incident response, we engineer security solutions to improve security outcomes across the business.
Your impact will be:
In this role, you will be on the front lines of our defense, investigating and responding to security incidents. You will analyze security alerts and events, using your expertise to identify potential threats and vulnerabilities. Conducting thorough investigations and root cause analyses will be part of your routine to understand and mitigate security incidents effectively.
Collaboration is key, as you will lead response teams consisting of security, IT, operations, and development teams to ensure coordinated incident response efforts. You will also contribute to developing and improving our incident response procedures, ensuring they are up-to-date and effective. Additionally, you will stay current with emerging security trends and threats, helping to bolster our defensive capabilities.
Some of your key responsibilities will include:
Incident Detection and Analysis: Monitor security alerts and events to identify potential security incidents.
Incident Response: Lead and coordinate response efforts to security incidents, ensuring timely and effective mitigation.
Investigation and Forensics: Conduct detailed investigations and forensic analysis to determine the root cause and scope of incidents.
Reporting: Create comprehensive incident reports and communicate findings to stakeholders.
Procedure Development: Contribute to the development and continuous improvement of incident response procedures and playbooks.
Collaboration: Work closely with IT, development, and other security teams to ensure a coordinated response to incidents.
Training and Awareness: Assist in training and raising awareness about security best practices and incident response procedures.
Post-Incident Review: Participate in post-incident reviews and lessons learned sessions to improve response capabilities.
What you will bring:
Strong understanding of network protocols, system logs, and typical attack vectors.
Experience with SIEM tools (e.g., Elastic, Splunk).
Familiarity with common scripting languages (e.g., Python, PowerShell, Bash).
Knowledge of operating systems (Windows, Linux, macOS), their security features, and commonly used TTPs in exploiting each.
Excellent problem-solving and analytical skills.
Effective written and verbal communication skills.
Ability to work in a high-pressure environment and handle multiple tasks simultaneously.
What will give you an edge:
7-10+ years of experience in cybersecurity, with extensive experience in incident response and digital forensics.
Relevant industry certifications.
Proficiency with advanced forensic tools and techniques.
Experience with malware analysis and reverse engineering.
In-depth knowledge of threat intelligence and threat hunting methodologies.
Hands-on experience with EDR solutions (e.g., CrowdStrike, Carbon Black).
Strong understanding of cloud security (AWS, Azure, Google Cloud).
Leadership experience, including mentoring and guiding junior analysts.
Familiarity with regulatory and compliance frameworks (e.g., GDPR, PCI-DSS, HIPAA).
Ability to develop and deliver training sessions and incident response exercises.
Compensation Range (DOE/Location): $150-180k base + annual bonus
Staff Security Analyst (Incident Response)
To see similar active jobs please follow this link: Remote System Administration jobs
**Candidate Note: This position is 100% remote for candidates based in the US**
We are seeking a highly skilled and proactive Incident Response Analyst to join our dynamic security team. As a key member of our incident response team, you will play a critical role in identifying, analyzing, and mitigating security incidents. You will work closely with cross-functional teams to ensure a swift and effective response to security threats, fostering a culture of vigilance and continuous improvement.
The EDB Security Operations team provides frontline security protection for EDB, our employees, and our customers. In addition to threat detection and incident response, we engineer security solutions to improve security outcomes across the business.
Your impact will be:
In this role, you will be on the front lines of our defense, investigating and responding to security incidents. You will analyze security alerts and events, using your expertise to identify potential threats and vulnerabilities. Conducting thorough investigations and root cause analyses will be part of your routine to understand and mitigate security incidents effectively.
Collaboration is key, as you will lead response teams consisting of security, IT, operations, and development teams to ensure coordinated incident response efforts. You will also contribute to developing and improving our incident response procedures, ensuring they are up-to-date and effective. Additionally, you will stay current with emerging security trends and threats, helping to bolster our defensive capabilities.
Some of your key responsibilities will include:
Incident Detection and Analysis: Monitor security alerts and events to identify potential security incidents.
Incident Response: Lead and coordinate response efforts to security incidents, ensuring timely and effective mitigation.
Investigation and Forensics: Conduct detailed investigations and forensic analysis to determine the root cause and scope of incidents.
Reporting: Create comprehensive incident reports and communicate findings to stakeholders.
Procedure Development: Contribute to the development and continuous improvement of incident response procedures and playbooks.
Collaboration: Work closely with IT, development, and other security teams to ensure a coordinated response to incidents.
Training and Awareness: Assist in training and raising awareness about security best practices and incident response procedures.
Post-Incident Review: Participate in post-incident reviews and lessons learned sessions to improve response capabilities.
What you will bring:
Strong understanding of network protocols, system logs, and typical attack vectors.
Experience with SIEM tools (e.g., Elastic, Splunk).
Familiarity with common scripting languages (e.g., Python, PowerShell, Bash).
Knowledge of operating systems (Windows, Linux, macOS), their security features, and commonly used TTPs in exploiting each.
Excellent problem-solving and analytical skills.
Effective written and verbal communication skills.
Ability to work in a high-pressure environment and handle multiple tasks simultaneously.
What will give you an edge:
7-10+ years of experience in cybersecurity, with extensive experience in incident response and digital forensics.
Relevant industry certifications.
Proficiency with advanced forensic tools and techniques.
Experience with malware analysis and reverse engineering.
In-depth knowledge of threat intelligence and threat hunting methodologies.
Hands-on experience with EDR solutions (e.g., CrowdStrike, Carbon Black).
Strong understanding of cloud security (AWS, Azure, Google Cloud).
Leadership experience, including mentoring and guiding junior analysts.
Familiarity with regulatory and compliance frameworks (e.g., GDPR, PCI-DSS, HIPAA).
Ability to develop and deliver training sessions and incident response exercises.
Compensation Range (DOE/Location): $150-180k base + annual bonus
