Cyber Incident Response Analyst

New

Skills

Digital Forensics

6 minutes agoReport problemBinary Defense is a cybersecurity firm that provides a range of security services designed to protect businesses from digital threats. The company operates as an extension of client teams, offering managed detection and response, co-managed SIEM, threat hunting, and digital risk protection services around the clock. With a focus on increasing security visibility and reducing complexity, Binary Defense uses a combination of human expertise and technology to offer comprehensive threat detection and response. Their services also include phishing response and incident response, all delivered through a 24/7 security operations center. By integrating advanced threat intelligence and tactical remediation strategies, Binary Defense aims to stay ahead of emerging cyber threats, ensuring the safety of client digital assets.Managed Security • Threat Intelligence • SIEM Management • Consulting • Detection and Response• Binary Defense (BD) is seeking a talented Cybersecurity Incident Response Analyst • You will be a hybrid analyst supporting Incident Response (IR) and Analysis on Demand (AOD) cases • Driving all client meetings to discuss scope and incident updates, creating technical reports, and leading the investigation • You will conduct incident triage/verification, incident scoping and hunting through network, containment and remediation recommendations to customer • Identify and analysis malicious artifacts, and perform intelligence correlation • Serve as the primary responder and point of contact in the response effort, forensic investigation, analysis and resolution of security incidents • Interact with all levels of the organization and be viewed as a subject matter expert on all incident response activities • Understand existing and emerging threat actors and identify rapidly changing tools, tactics, and procedures of attackers • Participate and manage large client-facing projects and train and mentor other IR members • MUST be familiar with Incident Response best practices and procedures • MUST have Windows Incident Response and computer forensics experience • MUST be familiar with network analysis, memory analysis, and digital forensics • MUST possess excellent verbal and written communication skills• Bachelor’s degree in Cybersecurity, Computer Science, Information Systems, a related field, or equivalent practical experience • Certified in one or more of the following: GCIH, GCFE, GCFA, GREM, GNFA • 5+ of experience with investigations in network forensics, host forensics, memory forensics, reverse malware engineering, threat intelligence, and enterprise security architecture • Platforms should be Windows, MacOS, or Linux • 2+ years of experience leading incident response investigations, analysis, containment, and remediation actions • 1+ years of leadership experience within a SOC or leading IR teams • SME in multiple cyber security technologies, including firewalls, IDS/IPS, network access control, email and web security, digital forensics, endpoint detection and response, vulnerability scanning and analysis, SIEM, and SOAR technologies • Strong experience using SIFT workstation and other digital forensics tools • Demonstrated knowledge and experience with Lockheed Martin’s Cyber Kill Chain and the MITRE ATT&CK Framework • Ability to communicate investigative findings and strategies to technical staff, executive leadership, internal and external clients, and legal counsel • Effective time management skills to balance time among multiple tasks and mentor junior staff as needed • Strong analytical and problem-solving skills • Willingness to learn and continually improve skills to ensure continued success of the business and its customers• Competitive medical, dental and vision coverage for employees and dependents • 401k match which vests every payroll • Flexible and remote friendly work environment • Training opportunities to expand your skill set

Job Type: Remote

Salary: Not Disclosed

Experience: Entry

Duration: 12 Months

Share this job:

Similar Jobs

Remote eDiscovery Careers

Posted 80 days ago

Deliver comprehensive eDiscovery solutions

Enhance productivity using AI and analytics

Cybersecurity Digital Forensics Remote Collaboration

Quality Assurance Engineer Role

Posted 80 days ago

Ensure software product quality through comprehensive testing.

Develop and maintain automated test frameworks and scripts.

C# Ci/cd Pipelines Digital Forensics Git

Security Engineer SecOps Remote

Posted 101 days ago

Respond to and investigate security incidents across platforms.

Develop and improve incident management processes and runbooks.

AWS Devops Digital Forensics Engineer

Data Monitoring Investigation

Posted 279 days ago

Identify unauthorized access

Gather evidence of monitoring

Cloud Security Cybersecurity Data Analysis Digital Forensics

AML Screening Officer

Posted 284 days ago

Prevent unauthorized access and financial fraud

Enhance financial safety and transparency

Anti-money Laundering Digital Forensics Transaction monitoring

Team Lead, Threat Analyst

Posted 299 days ago

Lead and mentor a team of threat analysts, Coordinate and manage security incident investigations,

erve as a subject matter expert during cybersecurity incidents, Stay up to date with the latest

Cybersecurity Digital Forensics Endpoint Security Network Security
overtime