Incident Response Analyst Team Lead
United States - Remote
â ď¸ We'll shut down after Aug 1st - try foođŚ for all jobs in tech â ď¸
Thrive
Thrive is a leading provider of outsourced IT infrastructure. Our managed services provide customers with a strategic advantage as they secure, scale, and succeed.About UsÂ
Thrive is a rapidly growing technology solutions provider focusing upon Cloud, Cyber Security, Networking, Disaster Recovery and Managed Services. Our corporate culture, engineering talent, customer-centric approach, and focus upon ânext generationâ services help us stand out amongst our peers. Thrive is on the look-out for individuals who donât view their weekdays spent at âa jobâ but rather look to develop valuable skills that ignite their passion and lead to a CAREER. If youâre attracted to a âwork hard, play hardâ environment, seeking the guidance, training and experience necessary to build a lucrative career, then welcome to THRIVE!!Â
Position OverviewÂ
With a growing client base, Thrive is expanding its security team. We are looking for an experienced Incident Response Analyst Team Lead to join our Cyber Security Incident Response Team. This pivotal role involves leading incident response efforts, mentoring analysts, and continuously improving our customers' security posture by preventing, detecting, analyzing, and responding to cybersecurity incidents using cutting-edge technology and robust processes.Â
The ideal candidate will bring a blend of leadership, deep technical expertise, and a passion for incident response and forensics. They will play a key role in handling high-priority incidents, refining incident response processes, and mentoring team members to ensure operational excellence.Â
Primary ResponsibilitiesÂ
Provide mentorship, coaching, and guidance to SOC Analysts and Incident Response AnalystÂ
Foster collaboration across teams to enhance threat intelligence sharing and operational efficiencyÂ
Act as a point of escalation for complex investigations and high-priority incidentsÂ
Lead incident response and threat hunting efforts for confirmed high-priority security incidents, ensuring resolution and documentationÂ
Investigate intrusion attempts, differentiate false positives from actual threats, and perform in-depth analysis of exploitsÂ
Proactively monitor and respond to emerging threats using advanced tools and methodologiesÂ
Conduct forensic analysis, including memory and disk imaging, to identify evidence of compromise and attacker activityÂ
Collect, preserve, and analyze digital evidence to support investigations and potential legal actionsÂ
Utilize forensic tools to uncover artifacts such as deleted files, malware remnants, and network tracesÂ
Develop and maintain incident response playbooks, ensuring alignment with the overall security strategyÂ
Conduct regular reviews and updates of playbooks to address evolving threats and technologiesÂ
Participate in tabletop exercises to validate and refine playbooks and incident response proceduresÂ
Analyze SOC, SIEM, and EDR platform data to identify and escalate potential threats.Â
Collaborate with cross-functional teams to implement security best practices for internal and external clientsÂ
Ensure adherence to Thriveâs security standards while recommending future enhancements to tools and workflowsÂ
Utilize threat intelligence to identify potential security risks and proactively mitigate themÂ
Stay current on emerging threats, vulnerabilities, and adversarial tactics, techniques, and procedures (TTPs)Â
QualificationsÂ
Required Skills and ExperienceÂ
Demonstrated experience in incident handling, escalation management, or leading high-priority incident investigationsÂ
Demonstrated expertise in best security practices and incident response methodologies.Â
Advanced knowledge of:Â
Security Information and Event Management (SIEM) toolsÂ
Networking (TCP/IP, routing, and switching)Â
IDS/IPS, penetration testing, and vulnerability assessmentsÂ
Windows, UNIX, and Linux operating systemsÂ
Network protocols and packet analysis toolsÂ
Endpoint Detection and Response (EDR), antivirus, and anti-malware toolsÂ
Content filtering and email/web gatewaysÂ
Hands-on experience in forensics, malware analysis, and intrusion detectionÂ
Familiarity with industry frameworks such as MITRE ATT&CK and the Cyber Kill ChainÂ
Proven ability to communicate complex security issues to clients, peers, and managementÂ
Strong analytical, problem-solving, and decision-making skillsÂ
Adaptability to rapidly evolving situations and technologiesÂ
Ability to participate in an on-call rotation for high-priority incidentsÂ
Preferred SkillsÂ
Knowledge of common system calls and APIs for Windows and Linux/Unix environmentsÂ
Experience with programming languages relevant to security analysis and automationÂ
Understanding of internal file structures commonly associated with malwareÂ
Experience in detection engineering and creating high-fidelity detection rulesÂ
Advanced cloud security knowledge and expertise in investigating cloud-based intrusionsÂ
Desired CertificationsÂ
Computer Hacking Forensic Investigator (CHFI)Â
GIAC Certified Forensic Analyst (GCFA)Â
GIAC Certified Forensic Examiner (GCFE)Â
Certified Incident Handler (GCIH)Â
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index đ°
Tags: Antivirus APIs Automation CHFI Cloud Cyber Kill Chain EDR Exploits Forensics GCFA GCFE GCIH GIAC IDS Incident response Intrusion detection IPS Linux Malware MITRE ATT&CK Pentesting Security analysis Security strategy SIEM SOC Strategy TCP/IP Threat intelligence TTPs UNIX Vulnerabilities Windows
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.