Montefiore Health System
INCIDENT RESPONSE ANALYST - IT SECURITY (JR226222)
Montefiore Health System, Yonkers, New York, United States
INCIDENT RESPONSE ANALYST - IT SECURITY (JR226222)
Join to apply for the
INCIDENT RESPONSE ANALYST - IT SECURITY (JR226222)
role at
Montefiore Health System INCIDENT RESPONSE ANALYST - IT SECURITY (JR226222)
Join to apply for the
INCIDENT RESPONSE ANALYST - IT SECURITY (JR226222)
role at
Montefiore Health System Montefiore Health System provided pay range
This range is provided by Montefiore Health System. Your actual pay will be based on your skills and experience — talk with your recruiter to learn more. Base pay range
$72,000.00/yr - $90,000.00/yr Introduction
To heal, to teach, to discover and to advance the health of the communities we serve.
To learn more about the “Montefiore Difference” – who we are at Montefiore and all that we have to offer our associates, please click here.
Overview
The Incident Response Analyst is responsible for responding to cybersecurity incidents, conducting in-depth malware analysis, and utilizing forensic tools to investigate and mitigate threats. This role involves identifying and analyzing security incidents, determining their impact, and implementing corrective actions to safeguard the organization’s information systems. The Incident Response Analyst works closely with Incident Response Engineers, Threat Detection Analysts and other cybersecurity teams to ensure a coordinated and effective response to security threats.
*The compensation range for this position is $71,300 to $123,700.*
Responsibilities
Monitor security alerts and notifications from various security tools to identify potential incidents. Respond to security incidents by following the organization’s incident response procedures. Perform initial triage of security incidents, including assessing the scope, severity, and potential impact. Collaborate with other teams to contain and mitigate incidents, ensuring minimal disruption to business operations. Document all actions taken during the incident response process in detailed incident reports. Analyze suspicious files, emails, and URLs to determine whether they contain malware. Perform dynamic and static malware analysis to understand the behavior and functionality of malicious code. Identify indicators of compromise (IOCs) associated with malware and develop detection signatures for review by Incident Response Engineers. Reverse-engineer malware to uncover its components, behavior, and potential impact on the organization. Provide recommendations for remediation and protection against similar threats in the future. Utilize digital forensic tools to investigate compromised systems and identify the root cause of incidents. Collect, preserve, and analyze digital evidence in compliance with legal and regulatory requirements. Conduct memory, disk, and network forensics to uncover the extent of an attack and the methods used by the attacker. Assist in post-incident investigations, including gathering evidence, preparing forensic reports, and supporting legal actions if necessary. Communicate findings, analysis results, and recommendations to technical and non-technical stakeholders. Participate in incident post-mortem meetings to review the effectiveness of the incident response process and identify areas for improvement. Maintain and optimize the tools used for incident detection, malware analysis, and forensic investigations. Stay current with the latest developments in cybersecurity tools, techniques, and best practices. Contribute to the development and refinement of incident response playbooks and procedures.
Requirements
Strong understanding of cybersecurity concepts, including threat detection, malware analysis, and digital forensics. Proficiency in using malware analysis tools such as IDA Pro, OllyDbg, and Ghidra. Experience with forensic tools like EnCase, FTK, Autopsy, and Volatility. Familiarity with SIEM (Security Information and Event Management) systems, IDS/IPS (Intrusion Detection/Prevention Systems), and EDR (Endpoint Detection and Response) solutions. Knowledge of operating systems (Windows, Linux, macOS) and network protocols. Ability to analyze complex security incidents, determine the root cause, and implement effective remediation strategies. Strong analytical skills to dissect and understand the behavior of malware. Attention to detail in forensic investigations to ensure accurate and reliable results. Experience with scripting languages (e.g., Python, PowerShell) for automating malware analysis and forensic tasks. Ability to develop custom scripts to enhance incident response capabilities. Excellent written and verbal communication skills, with the ability to document incidents and communicate technical details to diverse audiences. Strong reporting skills, including the ability to create detailed and actionable forensic and incident response reports.
Required Experience
Experience: 3-5 years of experience in cybersecurity, with a focus on incident response, malware analysis, and digital forensics. Experience in Incident Response: Hands-on experience in detecting, responding to, and mitigating security incidents. Experience in Malware Analysis: Proven expertise in analyzing and reverse-engineering malware. Experience in Forensics: Extensive experience using forensic tools to investigate security breaches and conduct post-incident analysis.
Education
Associate’s degree or equivalent experience in Computer Science, Information Security, Cybersecurity, or a related field. Preferred: Bachelor’s Degree in Cybersecurity or related discipline. Certifications (Preferred but not required): GIAC Certified Incident Handler (GCIH) GIAC Reverse Engineering Malware (GREM) Certified Information Systems Security Professional (CISSP) Certified Forensic Computer Examiner (CFCE) Certified Ethical Hacker (CEH) SANS FOR508: Advanced Incident Response, Threat Hunting, and Digital Forensics
Seniority level
Seniority level Mid-Senior level Employment type
Employment type Full-time Job function
Job function Management and Manufacturing Industries Hospitals and Health Care Referrals increase your chances of interviewing at Montefiore Health System by 2x Sign in to set job alerts for “Incident Analyst” roles.
New York City Metropolitan Area 1 week ago Cyber Triage and Forensics - Junior Analyst
Hoboken, NJ $60,400.00-$109,600.00 1 day ago New York, NY $70,000.00-$85,000.00 1 day ago Ridgefield Park, NJ $32.00-$32.00 3 weeks ago Incident Response Analyst, Office of Chief Information Officer
New York, NY $90,000.00-$115,000.00 1 week ago New York, NY $63,750.00-$105,000.00 4 days ago New York, NY $80,000.00-$115,000.00 3 weeks ago Cyber Triage and Forensics - Junior Analyst
Secaucus, NJ $60,400.00-$109,600.00 5 days ago Cyber Triage and Forensics - Junior Analyst
Hoboken, NJ $60,400.00-$109,600.00 5 days ago Cyber Triage and Forensics - Junior Analyst
Information Security and Compliance Analyst
New York, NY $95,000.00-$105,000.00 3 weeks ago Information Security Analyst (Application Security)
New York, NY $68,300.00-$151,200.00 5 days ago New York, NY $80,000.00-$105,000.00 1 week ago New York, NY $115,000.00-$150,000.00 1 month ago Purchase, NY $85,000.00-$140,000.00 1 week ago New York, NY $80,000.00-$120,000.00 3 weeks ago New York, NY $90,000.00-$110,000.00 6 days ago New York, NY $100,000.00-$145,000.00 5 days ago New York City Metropolitan Area $150,000.00-$170,000.00 5 months ago Endpoint Security and Identity and Access Management (IAM) Specialist for the Division of HPD TECH
New York, NY $69,324.00-$79,723.00 3 months ago Newark, NJ $100,000.00-$145,000.00 5 days ago New York, NY $160,000.00-$185,000.00 2 weeks ago We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-Ljbffr
Join to apply for the
INCIDENT RESPONSE ANALYST - IT SECURITY (JR226222)
role at
Montefiore Health System INCIDENT RESPONSE ANALYST - IT SECURITY (JR226222)
Join to apply for the
INCIDENT RESPONSE ANALYST - IT SECURITY (JR226222)
role at
Montefiore Health System Montefiore Health System provided pay range
This range is provided by Montefiore Health System. Your actual pay will be based on your skills and experience — talk with your recruiter to learn more. Base pay range
$72,000.00/yr - $90,000.00/yr Introduction
To heal, to teach, to discover and to advance the health of the communities we serve.
To learn more about the “Montefiore Difference” – who we are at Montefiore and all that we have to offer our associates, please click here.
Overview
The Incident Response Analyst is responsible for responding to cybersecurity incidents, conducting in-depth malware analysis, and utilizing forensic tools to investigate and mitigate threats. This role involves identifying and analyzing security incidents, determining their impact, and implementing corrective actions to safeguard the organization’s information systems. The Incident Response Analyst works closely with Incident Response Engineers, Threat Detection Analysts and other cybersecurity teams to ensure a coordinated and effective response to security threats.
*The compensation range for this position is $71,300 to $123,700.*
Responsibilities
Monitor security alerts and notifications from various security tools to identify potential incidents. Respond to security incidents by following the organization’s incident response procedures. Perform initial triage of security incidents, including assessing the scope, severity, and potential impact. Collaborate with other teams to contain and mitigate incidents, ensuring minimal disruption to business operations. Document all actions taken during the incident response process in detailed incident reports. Analyze suspicious files, emails, and URLs to determine whether they contain malware. Perform dynamic and static malware analysis to understand the behavior and functionality of malicious code. Identify indicators of compromise (IOCs) associated with malware and develop detection signatures for review by Incident Response Engineers. Reverse-engineer malware to uncover its components, behavior, and potential impact on the organization. Provide recommendations for remediation and protection against similar threats in the future. Utilize digital forensic tools to investigate compromised systems and identify the root cause of incidents. Collect, preserve, and analyze digital evidence in compliance with legal and regulatory requirements. Conduct memory, disk, and network forensics to uncover the extent of an attack and the methods used by the attacker. Assist in post-incident investigations, including gathering evidence, preparing forensic reports, and supporting legal actions if necessary. Communicate findings, analysis results, and recommendations to technical and non-technical stakeholders. Participate in incident post-mortem meetings to review the effectiveness of the incident response process and identify areas for improvement. Maintain and optimize the tools used for incident detection, malware analysis, and forensic investigations. Stay current with the latest developments in cybersecurity tools, techniques, and best practices. Contribute to the development and refinement of incident response playbooks and procedures.
Requirements
Strong understanding of cybersecurity concepts, including threat detection, malware analysis, and digital forensics. Proficiency in using malware analysis tools such as IDA Pro, OllyDbg, and Ghidra. Experience with forensic tools like EnCase, FTK, Autopsy, and Volatility. Familiarity with SIEM (Security Information and Event Management) systems, IDS/IPS (Intrusion Detection/Prevention Systems), and EDR (Endpoint Detection and Response) solutions. Knowledge of operating systems (Windows, Linux, macOS) and network protocols. Ability to analyze complex security incidents, determine the root cause, and implement effective remediation strategies. Strong analytical skills to dissect and understand the behavior of malware. Attention to detail in forensic investigations to ensure accurate and reliable results. Experience with scripting languages (e.g., Python, PowerShell) for automating malware analysis and forensic tasks. Ability to develop custom scripts to enhance incident response capabilities. Excellent written and verbal communication skills, with the ability to document incidents and communicate technical details to diverse audiences. Strong reporting skills, including the ability to create detailed and actionable forensic and incident response reports.
Required Experience
Experience: 3-5 years of experience in cybersecurity, with a focus on incident response, malware analysis, and digital forensics. Experience in Incident Response: Hands-on experience in detecting, responding to, and mitigating security incidents. Experience in Malware Analysis: Proven expertise in analyzing and reverse-engineering malware. Experience in Forensics: Extensive experience using forensic tools to investigate security breaches and conduct post-incident analysis.
Education
Associate’s degree or equivalent experience in Computer Science, Information Security, Cybersecurity, or a related field. Preferred: Bachelor’s Degree in Cybersecurity or related discipline. Certifications (Preferred but not required): GIAC Certified Incident Handler (GCIH) GIAC Reverse Engineering Malware (GREM) Certified Information Systems Security Professional (CISSP) Certified Forensic Computer Examiner (CFCE) Certified Ethical Hacker (CEH) SANS FOR508: Advanced Incident Response, Threat Hunting, and Digital Forensics
Seniority level
Seniority level Mid-Senior level Employment type
Employment type Full-time Job function
Job function Management and Manufacturing Industries Hospitals and Health Care Referrals increase your chances of interviewing at Montefiore Health System by 2x Sign in to set job alerts for “Incident Analyst” roles.
New York City Metropolitan Area 1 week ago Cyber Triage and Forensics - Junior Analyst
Hoboken, NJ $60,400.00-$109,600.00 1 day ago New York, NY $70,000.00-$85,000.00 1 day ago Ridgefield Park, NJ $32.00-$32.00 3 weeks ago Incident Response Analyst, Office of Chief Information Officer
New York, NY $90,000.00-$115,000.00 1 week ago New York, NY $63,750.00-$105,000.00 4 days ago New York, NY $80,000.00-$115,000.00 3 weeks ago Cyber Triage and Forensics - Junior Analyst
Secaucus, NJ $60,400.00-$109,600.00 5 days ago Cyber Triage and Forensics - Junior Analyst
Hoboken, NJ $60,400.00-$109,600.00 5 days ago Cyber Triage and Forensics - Junior Analyst
Information Security and Compliance Analyst
New York, NY $95,000.00-$105,000.00 3 weeks ago Information Security Analyst (Application Security)
New York, NY $68,300.00-$151,200.00 5 days ago New York, NY $80,000.00-$105,000.00 1 week ago New York, NY $115,000.00-$150,000.00 1 month ago Purchase, NY $85,000.00-$140,000.00 1 week ago New York, NY $80,000.00-$120,000.00 3 weeks ago New York, NY $90,000.00-$110,000.00 6 days ago New York, NY $100,000.00-$145,000.00 5 days ago New York City Metropolitan Area $150,000.00-$170,000.00 5 months ago Endpoint Security and Identity and Access Management (IAM) Specialist for the Division of HPD TECH
New York, NY $69,324.00-$79,723.00 3 months ago Newark, NJ $100,000.00-$145,000.00 5 days ago New York, NY $160,000.00-$185,000.00 2 weeks ago We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-Ljbffr