Sr. Cybersecurity Incident Response Analyst (Application Analyst III) - Digital and Technology Partners - Remote
The Mount Sinai Cybersecurity Operations team seeks a highly motivated Sr. Cybersecurity Incident Response Analyst. This key team member will participate in incident response, threat investigations, threat campaigns, develop detection methodologies, and support the security monitoring team. The primary focus is to detect, analyze, and respond to cybersecurity incidents to minimize their impact, utilizing data analysis, threat intelligence, and advanced security technologies.
Responsibilities
- Respond to and triage cybersecurity incidents from 3rd party MDDR providers.
- Hunt for and identify threats, threat actor groups, and their techniques, tools, and processes.
- Lead and participate in 'hunt campaigns' using threat intelligence and log data analysis to detect and eliminate threat actors.
- Provide investigative support for large-scale and complex security incidents.
- Analyze security incidents to improve use cases and alert catalogs.
- Enhance processes for detection operations across multiple detection sets.
- Perform forensic analysis of network packets, DNS, proxy, Netflow, malware, host security, and application logs.
- Leverage the MITRE ATT&CK framework for analysis and detection improvements.
- Validate suspicious events using open-source and proprietary intelligence sources.
- Collaborate with teams to develop behavioral and signature detections using various machine learning techniques.
- Interface with internal teams to resolve issues and provide incident information.
- Become proficient with third-party threat intelligence tools as needed.
Qualifications
- Bachelor's degree in Computer Science or related field, or equivalent experience. Advanced degree preferred.
- Minimum five years of diverse IT experience.
Preferred Skills and Experience
- Experience with SIEM and SOAR platforms.
- Deep understanding of network and host intrusion analysis.
- Familiarity with frameworks like MITRE ATT&CK, STIX, TAXII, and the Cyber Kill Chain.
- Experience with EDR technologies (e.g., CrowdStrike, Carbon Black, Defender ATP, SentinelOne).
- Experience managing security in cloud environments (Azure, GCP, AWS).
- Reverse engineering, C&C exploitation, and system/network forensics experience.
Additional Preferred Skills
- Certifications such as GCIH, GCIA, GCFE, GREM, GCFA, GSEC, CEH.
- Experience with large data set normalization and parsing.
- Skills in statistical analysis, data modeling, clustering, and predictive analytics.
- Ability to translate security issues into analytical models and multitask effectively.
- Excellent communication skills.
- Knowledge of threat hunting tools and techniques.
- Experience in Red or Blue team operations.
- Passion for research and understanding internet threats.
- Ability to interface effectively with clients and document technical details clearly.