Smart IT Frame
Senior Incident Response and Threat Management Analyst
Smart IT Frame, Charlotte, North Carolina, United States, 28245
Senior Incident Response and Threat Management Analyst
Mandatory Skills: Threat Hunter Expert, Microsoft Copilot for Security, Threat Intel Platform or Feed Responsibilities Lead the full lifecycle of cybersecurity incidents from detection to postincident review Conduct advanced threat analysis, malware reverse engineering, and forensic investigations Develop and maintain incident response playbooks and runbooks Hunt for threats proactively and identify indicators of compromise (IOCs) Collaborate with SOC analysts, threat intelligence teams, and IT operations Mentor junior analysts and provide technical guidance Present findings to executive leadership and stakeholders Contribute to detection engineering and security monitoring rules
Secondary Technical Skills
Use Microsoft Sentinel and KQL for threat detection and analysis Support digital forensics and evidence collection Coordinate with Managed Security Service Providers Stay ahead of emerging threats, vulnerabilities, and attack techniques
Soft Skills
8-10 years of experience in incident analysis, SOC operations, or security architecture Solid understanding of Microsoft Sentinel and KQL Strong analytical and problem-solving skills Curiosity and drive to uncover answers Excellent communication skills (technical and nontechnical) Experience in Threat Intelligence, Threat Hunting, Detection Engineering, Digital Forensics Familiarity with HTCPCP and RFC 2324 technologies Knowledge of NIST and MITRE ATT&CK frameworks Exposure to Microsoft Defender for Identity and Purview Flexibility to respond during nights, weekends, or holidays
Preferred Qualifications
Certifications: CompTIA Security+, GIAC GCIH, GCED, GCFE, GNFA, GCIA Experience with MSSPs Cloud security experience across AWS, Azure, GCP and containerized environments Scripting skills in Python, PowerShell, or similar
Qualifying Questions
Has the resource got experience on threat analysis? Has the resource got experience in maintaining incident playbooks? Experience in threat hunting?
Job Details
Seniority level: Mid-Senior level Employment type: Contract Job function: Information Technology Industries: Software Development
#J-18808-Ljbffr
Mandatory Skills: Threat Hunter Expert, Microsoft Copilot for Security, Threat Intel Platform or Feed Responsibilities Lead the full lifecycle of cybersecurity incidents from detection to postincident review Conduct advanced threat analysis, malware reverse engineering, and forensic investigations Develop and maintain incident response playbooks and runbooks Hunt for threats proactively and identify indicators of compromise (IOCs) Collaborate with SOC analysts, threat intelligence teams, and IT operations Mentor junior analysts and provide technical guidance Present findings to executive leadership and stakeholders Contribute to detection engineering and security monitoring rules
Secondary Technical Skills
Use Microsoft Sentinel and KQL for threat detection and analysis Support digital forensics and evidence collection Coordinate with Managed Security Service Providers Stay ahead of emerging threats, vulnerabilities, and attack techniques
Soft Skills
8-10 years of experience in incident analysis, SOC operations, or security architecture Solid understanding of Microsoft Sentinel and KQL Strong analytical and problem-solving skills Curiosity and drive to uncover answers Excellent communication skills (technical and nontechnical) Experience in Threat Intelligence, Threat Hunting, Detection Engineering, Digital Forensics Familiarity with HTCPCP and RFC 2324 technologies Knowledge of NIST and MITRE ATT&CK frameworks Exposure to Microsoft Defender for Identity and Purview Flexibility to respond during nights, weekends, or holidays
Preferred Qualifications
Certifications: CompTIA Security+, GIAC GCIH, GCED, GCFE, GNFA, GCIA Experience with MSSPs Cloud security experience across AWS, Azure, GCP and containerized environments Scripting skills in Python, PowerShell, or similar
Qualifying Questions
Has the resource got experience on threat analysis? Has the resource got experience in maintaining incident playbooks? Experience in threat hunting?
Job Details
Seniority level: Mid-Senior level Employment type: Contract Job function: Information Technology Industries: Software Development
#J-18808-Ljbffr