Staff Incident Response Analyst

New
A
AlphaSenseMarket Intelligence
Remote - IndiaFull-TimeStaff
Salary not disclosed
Apply NowOpens the employer's application page

Job Details

Experience
6+ years

Requirements

  • 6+ years of hands-on incident response experience, with at least 3 years at a senior or staff level
  • Expert-level EDR proficiency (e.g., CrowdStrike Falcon, SentinelOne)
  • Deep AWS IR capability: CloudTrail forensics, IAM chain analysis, EC2/Lambda investigation
  • Strong Windows forensics: Prefetch, MFT, Shimcache, event logs, registry artifacts
  • Solid Linux forensics: persistence, cron, SUID analysis, log artifact interpretation
  • Hands-on SIEM investigation and detection experience (e.g., Google Chronicle, Splunk, Sentinel)
  • Identity incident response experience in an enterprise IdP (e.g., Okta, Entra ID)
  • Ability to scope and lead Sev1 incidents autonomously
  • Strong technical writing skills
  • MITRE ATT&CK fluency

Responsibilities

  • Receive and own L2 escalations across all severity levels; take over technical lead role on Sev2+
  • Scope incidents accurately and quickly: determine blast radius, affected assets, and attacker objectives
  • Make and document containment decisions with clear rationale
  • Maintain a forensically sound incident timeline
  • Perform deep-dive endpoint triage via EDR
  • Lead AWS-based IR and handle GCP incidents
  • Investigate identity provider and CIAM incidents
  • Conduct structured threat hunts and translate findings into detection recommendations
View Full Description & ApplyYou'll be redirected to the employer's site
View details
Apply Now