Thrive is hiring a
Incident Response Analyst

Logo of Thrive

Thrive

πŸ’΅ ~$41k-$62k
πŸ“Remote - Worldwide

Summary

Join Thrive, a rapidly growing technology solutions provider, as an Incident Response Analyst in our Security Operation Center. Assist with continuously monitoring and improving our customers' security posture, while preventing, detecting, analyzing, and responding to cybersecurity incidents utilizing technology and well-defined processes and procedures.

Requirements

  • Demonstrates comprehension of best security practices
  • Has advanced knowledge of the following systems and technologies: SIEM (Security Information and Event Management), TCP/IP, computer networking, routing, and switching, IDS/IPS, penetration and vulnerability testing, Firewall and intrusion detection/prevention protocols, Windows, UNIX, and Linux operating systems, Network protocols and packet analysis tools, EDR, Anti-virus, and anti-malware, Content filtering, Email and web gateway
  • Professional experience in an Incident Response Role
  • Ability to collaborate and communicate security issues to clients, peers, and management
  • Strong analytical and problem-solving skills
  • Adaptability and resilience in rapidly evolving situations
  • Ability to be a part of an on-call rotation, occasionally working nights, and weekends to support High Priority Security Incidents

Responsibilities

  • Process investigation requests from SOC Analysts who perform security event monitoring using Security Information and Event Management (SIEM) from multiple sources
  • Investigate intrusion attempts, differentiate false positives from true intrusion attempts, and perform in-depth analysis of exploits
  • Lead incident response and threat hunting efforts for confirmed High Priority security incidents and follow through until resolution
  • Utilize threat intelligence to identify and investigate potential security threats
  • Develop playbooks for incident response and incident management processes, including threat triage, incident investigation, and incident resolution
  • Conduct regular reviews of playbooks to ensure they are current and effective
  • Work with cross-functional teams to ensure that playbooks are aligned with the overall security strategy and goals
  • Participate in tabletop exercises and drills to test and validate playbooks
  • Monitor and evaluate security incidents to identify opportunities for improving playbooks
  • Keep up to date with current security threats and trends to ensure that playbooks are relevant and effective
  • Actively investigate the latest security vulnerabilities, advisories, incidents, and TTPs (tactics, techniques, and procedures) and work with the Security Engineering team to recommend use cases
  • Proactive monitoring, threat hunting, and response of known and/or emerging threats
  • Carry out Thrive’s information security strategy both internally and externally for 400+ clients
  • Analyze data from our SOC, SIEM and EDR platforms and determine if further analysis is needed
  • Work within Thrive’s security standards and best practices and recommend future enhancements

Share this job:

Disclaimer: Please check that the job is real before you apply. Applying might take you to another website that we don't own. Please be aware that any actions taken during the application process are solely your responsibility, and we bear no responsibility for any outcomes.

Similar Jobs

Please let Thrive know you found this job on JobsCollider. Thanks! πŸ™