Sr. Cybersecurity Incident Response Analyst

Irvine, CA

Origence

CU Direct delivers enterprise lending solutions and technology to over 1,100 financial institutions, 14,000 auto dealers as well as retailers and medical providers nationwide.

View all jobs at Origence

Apply now Apply later

About Origence

With 30 years at the forefront of fintech innovation, we specialize in SaaS lending solutions that lead the industry. Our core mission is customer-centric, focusing on empowering Credit Unions across the United States with the tools to offer accessible, competitive lending services. We're deeply committed to enhancing the financial ecosystem for a broad network of credit unions, members and auto dealers. We invest in our greatest assets, our employees, and foster a culture of innovation and ownership through freedom and responsibility. We celebrate fiscal accountability, operational rigor and efficiency to create a sustainably healthy and robust business for the long term.

The Sr. Cybersecurity Incident Response Analyst is our tip of the defensive spear against cyber-attacks. This includes identifying, containing, analyzing, and mitigating malicious activity and/or attacks in a timely and effective manner. The role involves coordinating incident response efforts, effectively communicating during incidents, and ensuring that proper procedures are followed to minimize damage, restore normal operations, and prevent future incidents. The Cybersecurity Incident Response Analyst also helps develop incident response tactics, plans, conducts post-incident reviews, and implements improvements to enhance the organization's security posture.

The major purpose of the Sr. Cybersecurity Incident Response Analyst is to ensure the organization can effectively detect, respond to, and recover from cybersecurity incidents. The role is vital in reducing the impact of security incidents on the organization’s systems, data, and reputation. The Sr. Cybersecurity Incident Response Analyst also aims to continuously improve incident response capabilities through proactive planning, training, and integration of best practices, ensuring the organization remains resilient against evolving cyber threats.

What You’ll Be Doing:

  1. Actively monitor cybersecurity defense tools and alert notifications by implementing best practices for effective triage and response.
  2. Triage alerts and respond as necessary by working with cross functional teams to ensure effective identification, containment, resolution of incidents, and creating incident reports.
  3. Monitor and track incident trends to improve detection, response times, and proactive measures, continuously evolving the incident response framework to address emerging threats. Develop metrics around alert notifications, triage rates, incident response types, and time to respond.
  4. Take ownership of, review, update, and train to the incident response runbooks by ensuring that they are clear, concise, and accurate.
  5. Collaborate with technical and business stakeholders to develop and perform department level tabletop exercises. Provide a retrospective that communicates strengths and weaknesses to improve upon.
  6. Remain current on attack trends and continuously develop defensive tactics to counter them. Maintain a continuous connection with industry feeds, professionals, and other forms of communication.

The Ideal Candidate:

Education:

  • Bachelors degree in Computer Science or Information Security.
  • Or equivalent experience.
  • Comptia, GIAC, IC2, or other related certifications a plus.

Experience:

  • 5+ years hands on experience with information technology.
  • 4+ years as a cybersecurity incident responder.
  • + 2 or more years cloud experience, Azure a plus.

Specialized Skills:

  • Advanced security data and event log analysis
  • Comprehensive network and application protocols knowledge
  • Proven malware and phishing analysis
  • Proficient knowledge of Python, PowerShell, and API’s
  • Working forensic analysis ability

Character traits:

  • Natural curiosity and high interest in cybersecurity and related technologies.
  • Ethical and team orientated
  • A sharp eye for pattern recognition and deviation
  • Ability to pivot and adapt

Why you should apply:

  • Flexible Working Environment
  • Paid Time Off
  • 401k (8% match)
  • College Tuition Benefits/ Tuition Reimbursement
  • Good Benefits options
  • Company Culture! Cultural and Holiday celebrations, Theme days like Star Wars Day & Bring your Kids to Work Day, Monthly Townhalls and Quarterly Company Meetings that ensure awareness, inclusion, and transparency.

The starting salary range for this full-time position in Irvine, CA is $111800 - $139800 per year. This base pay will take into consideration internal equity, candidate’s geographic region, job-related knowledge and experience among other factors. Origence maintains a highly competitive compensation program. Under company guidelines, this position is eligible for an annual bonus to provide an incentive to achieve targeted goals. Bonuses are awarded at company’s discretion on an individual basis.

Origence is an equal opportunity employer. All recruitment, hiring, training, compensation, benefits, discipline, and other terms and conditions of employment will be based upon an individuals’ qualifications regardless of race, religion, color, sex, gender identity, sexual orientation, national origin, ancestry, military service, marital status, pregnancy, age, protected medical condition, genetic information, disability or any other category protected by federal, state or local law.

Apply now Apply later
Job stats:  0  0  0

Tags: APIs Azure Cloud CompTIA Computer Science FinTech GIAC Incident response Log analysis Malware PowerShell Python SaaS

Perks/benefits: 401(k) matching Competitive pay Equity / stock options Flex hours Flex vacation Health care Salary bonus

Region: North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.