Enable job alerts via email!
Boost your interview chances
Create a job specific, tailored resume for higher success rate.
A leading company in Banking and Cybersecurity is seeking an experienced professional to join their Cyber Incident Response team. This role involves investigating security incidents, leading responses in cloud environments, and contributing to critical security operations. Candidates should have a strong background in Information Security with a focus on incident response and stakeholder management. The position offers remote work flexibility and opportunities for career advancement.
Employer Industry: Banking and Cybersecurity
Why consider this job opportunity:
- Salary up to $162,000
- Opportunity for career advancement and growth within the organization
- Work remotely from various locations across the United States
- Engaging and dynamic work environment within the Cyber Incident Response team
- Chance to contribute to critical security operations and incident management
What to Expect (Job Responsibilities):
- Investigate SIEM/SOAR events and respond to incidents using malware analysis and network/endpoint security expertise
- Lead cloud-related incident responses in Azure, AWS, and Google Cloud environments
- Coordinate the investigation, mitigation, and remediation of incidents while liaising with technical and business stakeholders
- Ensure proper detection, documentation, investigation, and resolution of Information Security incidents
- Support the creation of countermeasures and mitigations in response to incidents and contribute to threat hunting efforts
What is Required (Qualifications):
- Bachelor's Degree and 6 years of experience in Information Security, or High School Diploma/GED and 10 years of experience in Information Security
- Proven experience in incident response, including stakeholder management
- Ability to analyze and escalate security events across systems, applications, and networks
- Strong communication skills to distill complex issues for broader understanding
- Willingness to participate in after-hours on-call rotation
How to Stand Out (Preferred Qualifications):
- 2+ years of cloud administrative experience in Azure, AWS, and Google Cloud
- Familiarity with MITRE ATT&CK framework for countermeasure creation
- Experience in building proactive threat hunting capabilities
- Knowledge of translating threat actor techniques into mitigations using Yara, Sigma, or Regular Expressions
- Relevant certifications such as SANS Cloud certifications or GIAC Cloud Forensics Responder (GCFR)
#Banking #Cybersecurity #IncidentResponse #RemoteWork #CareerOpportunity #CompetitivePay
We prioritize candidate privacy and champion equal-opportunity employment. Central to our mission is our partnership with companies that share this commitment. We aim to foster a fair, transparent, and secure hiring environment for all. If you encounter any employer not adhering to these principles, please bring it to our attention immediately.
We are not the EOR (Employer of Record) for this position. Our role in this specific opportunity is to connect outstanding candidates with a top-tier employer.