Idaho State Job Bank
Incident Response Analyst at Motion Recruitment Partners in Boise, Idaho, United States Job Description Incident Response Analyst Remote Only Contract $40/hr - $60/hr We are seeking a highly skilled Cybersecurity Incident Response Analyst with expertise in threat detection, incident handling, and operational security. The ideal candidate will have a proven track record as part of an incident response team, with the ability to integrate artificial intelligence and machine learning into security operations workflows to enhance detection, automation, and response capabilities. Key Responsibilities: + Serve as a core member of the Incident Response (IR) team, performing cybersecurity analysis, incident detection, investigation, containment, eradication, and recovery. + Conduct root cause analysis, identify attack vectors, and develop recommendations to prevent recurrence. + Develop and maintain incident response playbooks and standard operating procedures. + Integrate AI/ML solutions into Security Operations Center (SOC) workflows to improve threat hunting, anomaly detection, and automated triage. + Utilize and optimize security tools including Splunk , SentinelOne , Armis , and SNA for log analysis, endpoint detection, network monitoring, and asset visibility. + Collaborate with SOC engineers, threat hunters, and vulnerability management teams to ensure seamless security operations. + Provide after-action reports, threat intelligence integration, and executive briefings on incident trends. + Stay current with evolving cyber threats, AI/ML advancements in security, and emerging incident response methodologies. Required Qualifications: + A minimum of eight (8) to twelve (12) years relevant experience. + A degree from an accredited College/University in the applicable field of services is required. If the individuals degree is not in the applicable field then four additional years of related experience is required. + Solid understanding of cybersecurity principles, attack vectors, malware analysis, network forensics, and digital evidence handling. + Proven work history in incident response roles. + Hands-on experience with SIEM, EDR, and network security platforms (Splunk, SentinelOne, Armis, SNA). + Strong knowledge of AI/ML applications in security operations, including model selection, tuning, and integration into existing workflows. + Familiarity with MITRE ATT&CK framework, threat hunting techniques, and cyber kill chain concepts. + Ability to work under pressure during active incidents and prioritize effect To view full details and how to apply, please login or create a Job Seeker account