About the job
The Work
The Cybersecurity Incident Response Triage Analyst will be an integral part of the Cyber Incident Response Team (CIRT) within the Chief Information Security Officer (CISO) organization. This shift-based role involves analyzing, scoping, and triaging alerts and notifications from various sources, including SIEM, security sensors, ticketing systems, and direct communications. A solid technical foundation is necessary for effective collaboration with incident response and operations teams to categorize events as relevant and differentiate true threats from false positives. Familiarity with incident response lifecycles, prevalent cyber threats, and federal reporting requirements is essential.
Primary Responsibilities:
- Monitor and respond to cybersecurity incidents associated with policy violations.
- Investigate and analyze incidents to assess their nature and scope.
- Coordinate with team leads and other Cybersecurity Incident Response Teams for effective incident resolution.
- Thoroughly document incidents and response activities.
- Stay informed about the latest cybersecurity threats and trends.
- Contribute to the development and enhancement of incident response strategies and procedures.
- Collaborate with operations, legal, human resources, and management to investigate security issues and assess true and false positives.
