RS
Cybersecurity Incident Response Engineer
REQ Solutions
New York · On-site Contract Senior $80 – $100/hr Today
About the role
Responsibilities
- Support a 24x7 cyber operations center through cyber incident investigation, triage, and response activities.
- Use specialized security tools including Splunk, Microsoft Defender, CrowdStrike, and other relevant technologies to support incident analysis and response.
- Collect, interpret, translate, and communicate technical information from artefacts associated with an investigation & translate to executive leadership.
- Conduct memory, disk, and image forensics during active investigations and triage efforts.
- Communicate clearly and confidently with both technical and non-technical audiences during incidents and post-incident activities.
- Provide senior-level consultation and professional support for major components of the company’s information security infrastructure, including deployment and optimization of forensics and detection tooling such as Axiom Forensics, Splunk, Microsoft Defender, and CrowdStrike.
- Partner with business and operational infrastructure teams regarding new and existing technologies, recommending post-incident security improvements and supporting implementation efforts.
- Review and analyze highly complex security data and information to provide meaningful insights, conclusions, and actionable recommendations.
- Define, implement, and apply area-wide security and/or continuity of business policies and standards, leveraging strong knowledge of globally recognized information security principles.
- Address high-risk security concerns and incidents, recommend risk mitigation actions, and support the establishment and publication of appropriate standards.
- Contribute to the achievement of broader Cybersecurity Platform objectives.
Education/Experience
- Significant experience in digital forensics, incident response, cybersecurity operations, or a related information security function.
- Experience supporting or operating within a 24x7 cyber operations center environment.
- Strong hands-on experience with tools such as Splunk, Microsoft Defender, CrowdStrike, and other incident response or threat detection platforms.
- Experience conducting digital forensic investigations, including memory, disk, and image analysis.
- Strong ability to collect, interpret, and communicate technical incident information to diverse stakeholder groups.
- Experience supporting enterprise information security infrastructure and contributing to security tooling optimization.
- Strong understanding of information security standards, controls, policies, and industry best practices.
- Experience addressing high-risk security concerns and supporting remediation or mitigation efforts.
Skills
Axiom ForensicsCrowdStrikeMicrosoft DefenderSplunk
Don't send a generic resume
Paste this job description into Mimi and get a resume tailored to exactly what the hiring team is looking for.
Get started free