Logo
Kaseya

Security Incident Response Analyst

Kaseya, Miami, Florida, us, 33222

Save Job

Security Operations | Threat Hunter | Malware analysis | Leadership This is a full-time, on-site role for a Security Incident Response Analyst located in Miami, FL. The Security Incident Response Analyst will be responsible for handling day-to-day tasks such as incident detection, response, and analysis. The role involves monitoring security events, investigating security alerts, performing malware analysis, and coordinating with other teams to mitigate and resolve security incidents. Additional responsibilities include creating and maintaining incident response documentation and developing strategies to improve response and prevention capabilities.

What You’ll Do

Act as a frontline incident responder, leading containment, eradication, and recovery for confirmed threats

Perform advanced threat hunting across enterprise environments to proactively detect adversarial activity

Conduct in-depth malware analysis using static and dynamic techniques

Manage escalations from junior analysts and provide mentorship and technical guidance

Correlate events across multiple data sources (SIEM, EDR, network logs, cloud platforms) to identify sophisticated attack patterns

Deliver clear, actionable incident reports and executive-level summaries

Collaborate with cross-functional teams to ensure remediation and long-term risk reduction

Contribute to playbook development, threat intelligence enrichment, and detection rules to enhance SOC capabilities

Qualifications

Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or equivalent experience

3–5 years of hands‑on experience in cybersecurity operations, incident response, or threat analysis

Prior experience in a SOC or IR role with expertise in at least two domains: incident response, malware analysis, threat hunting, digital forensics, or security engineering

Proficiency with SIEMs, EDR, and network forensic tools (e.g., Splunk, Sentinel, CrowdStrike, Carbon Black)

Familiarity with common attacker TTPs and frameworks (MITRE ATT&CK, NIST CSF)

Strong ability to communicate technical details to both technical teams and executive leadership

Experience leading small projects or initiatives within a SOC/CIRT team is highly desirable

What You’ll Bring

Deep technical knowledge of security concepts, threats, and incident response best practices

Ability to independently investigate, analyze, and resolve complex security incidents

Experience with scripting or automation (Python, PowerShell, Bash) to accelerate investigations is a plus

A proactive mindset with a strong interest in continuous learning and awareness of the threat landscape

#J-18808-Ljbffr