Kaseya
Security Operations | Threat Hunter | Malware analysis | Leadership
This is a full-time, on-site role for a Security Incident Response Analyst located in Miami, FL. The Security Incident Response Analyst will be responsible for handling day-to-day tasks such as incident detection, response, and analysis. The role involves monitoring security events, investigating security alerts, performing malware analysis, and coordinating with other teams to mitigate and resolve security incidents. Additional responsibilities include creating and maintaining incident response documentation and developing strategies to improve response and prevention capabilities.
What You’ll Do
Act as a frontline incident responder, leading containment, eradication, and recovery for confirmed threats
Perform advanced threat hunting across enterprise environments to proactively detect adversarial activity
Conduct in-depth malware analysis using static and dynamic techniques
Manage escalations from junior analysts and provide mentorship and technical guidance
Correlate events across multiple data sources (SIEM, EDR, network logs, cloud platforms) to identify sophisticated attack patterns
Deliver clear, actionable incident reports and executive-level summaries
Collaborate with cross-functional teams to ensure remediation and long-term risk reduction
Contribute to playbook development, threat intelligence enrichment, and detection rules to enhance SOC capabilities
Qualifications
Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or equivalent experience
3–5 years of hands‑on experience in cybersecurity operations, incident response, or threat analysis
Prior experience in a SOC or IR role with expertise in at least two domains: incident response, malware analysis, threat hunting, digital forensics, or security engineering
Proficiency with SIEMs, EDR, and network forensic tools (e.g., Splunk, Sentinel, CrowdStrike, Carbon Black)
Familiarity with common attacker TTPs and frameworks (MITRE ATT&CK, NIST CSF)
Strong ability to communicate technical details to both technical teams and executive leadership
Experience leading small projects or initiatives within a SOC/CIRT team is highly desirable
What You’ll Bring
Deep technical knowledge of security concepts, threats, and incident response best practices
Ability to independently investigate, analyze, and resolve complex security incidents
Experience with scripting or automation (Python, PowerShell, Bash) to accelerate investigations is a plus
A proactive mindset with a strong interest in continuous learning and awareness of the threat landscape
#J-18808-Ljbffr
What You’ll Do
Act as a frontline incident responder, leading containment, eradication, and recovery for confirmed threats
Perform advanced threat hunting across enterprise environments to proactively detect adversarial activity
Conduct in-depth malware analysis using static and dynamic techniques
Manage escalations from junior analysts and provide mentorship and technical guidance
Correlate events across multiple data sources (SIEM, EDR, network logs, cloud platforms) to identify sophisticated attack patterns
Deliver clear, actionable incident reports and executive-level summaries
Collaborate with cross-functional teams to ensure remediation and long-term risk reduction
Contribute to playbook development, threat intelligence enrichment, and detection rules to enhance SOC capabilities
Qualifications
Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or equivalent experience
3–5 years of hands‑on experience in cybersecurity operations, incident response, or threat analysis
Prior experience in a SOC or IR role with expertise in at least two domains: incident response, malware analysis, threat hunting, digital forensics, or security engineering
Proficiency with SIEMs, EDR, and network forensic tools (e.g., Splunk, Sentinel, CrowdStrike, Carbon Black)
Familiarity with common attacker TTPs and frameworks (MITRE ATT&CK, NIST CSF)
Strong ability to communicate technical details to both technical teams and executive leadership
Experience leading small projects or initiatives within a SOC/CIRT team is highly desirable
What You’ll Bring
Deep technical knowledge of security concepts, threats, and incident response best practices
Ability to independently investigate, analyze, and resolve complex security incidents
Experience with scripting or automation (Python, PowerShell, Bash) to accelerate investigations is a plus
A proactive mindset with a strong interest in continuous learning and awareness of the threat landscape
#J-18808-Ljbffr