What are the responsibilities and job description for the Incident Response Analyst position at SCIGON?
A member of the team that prepares for and mounts rapid responses to security threats and attacks such as viruses and denial-of-service attacks. Requires a bachelor's degree and 1-3 years of incident response or digital forensics experience.
Skills:Security Operations Center Analyst
Malware Analysis
Packet Capture Analysis
Splunk SPL
Windows Forensics
Bash
Python
SOAR
SIEM tools
PowerShell
Crowdstrike Falcon
Analyze, Triage, and Respond to Alerts: Generated by Security Tools, maintaining SOAR SIEM alerts through tuning and critical thinking.
Maintain SLAs: Ensure timely incident resolution.
Document Findings: Thoroughly document findings and actions taken during the incident.
Not Required: Data trend analysis using Splunk SPL.
Dress Code: Casual