Incident Handler (Remote)

Remote: 
Full Remote
Contract: 
Work from: 

Offer summary

Qualifications:

Bachelor’s degree in Computer Science or relevant security certifications (CISSP, CISM, CISA, etc.), 2+ years of experience in incident response or information security operations, Bilingual in French and English is required, In-depth knowledge of EDR/SIEM/SOAR technologies and modern security trends..

Key responsabilities:

  • Provide expertise in proactive analysis and incident response scenarios.
  • Conduct network monitoring and intrusion detection analysis for security breaches.
  • Coordinate with other security teams to identify and remediate threats.
  • Maintain technical documentation and respond to client inquiries professionally.

GoSecure logo
GoSecure SME http://www.gosecure.net
51 - 200 Employees
See all jobs

Job description

GoSecure is recognized as a leader and innovator in cybersecurity solutions. The company is the first and only to integrate an Endpoint and Network threat detection platform, Managed Detection and Response services, and Cloud/SaaS delivery. Together, these capabilities provide the most effective response to the increased sophistication of continuously evolving malware and malicious insiders that target people, processes and systems. With focus on innovation quality, integrity, and respect, GoSecure has become the trusted provider of cybersecurity products and services to organizations of all sizes, across all industries globally. To learn more, please visit: https://www.gosecure.net.

GoSecure offers a creative and challenging work environment, a competitive benefit package, and a great atmosphere to foster career growth. Come put your career on the leading-edge and bring your talents to a much sought-after high growth opportunity in technology- GoSecure!

Summary

The MDR Incident Handler will guide Active Response Center (ARC) team members by providing expertise, leadership, and technical knowledge on a variety of security issues. This role plays a key, tactical and operational role in the development, management, and continuous improvement of GoSecure’s ability to respond to various threats. This role also serves as an escalation point for potential security incidents and must be able to perform the necessary technical and managerial tasks to summarize incident related data. The Incident Handler has the responsibility to perform technical analysis, document findings, and recommendations, provide timelines and deliver updates and other communications to audiences ranging from internal teams and executives to our most discerning customers.  

Duties and Responsibilities

  • Provide security subject matter expertise in proactive analysis or in incident response scenarios; investigate security breaches and other cybersecurity incidents.
  • Conduct network monitoring and intrusion detection analysis to determine if there have been any attacks on systems.
  • Analyze technical information to determine impact and action plans, triage incidents and events for direct action.
  • Participate in response activities across teams or directly with stakeholders to identify and remediate potential threats.
  • Stay up-to-date and evaluate security trends, evolving threats, risks and vulnerabilities and apply tools and subject matter expertise to evaluate the risk in the context of the enterprise to mitigate risk.
  • Coordinate activities with other security teams including threat intelligence, penetration testers, and product groups.
  • Utilize cyber incident response processes and procedures and provide routine updates.
  • Maintain technical documentation including standard operating procedures and incident response processes/procedures.
  • Answer clients’ inquiries via phone or email in a professional and timely manner.
  • Other duties as required.

Requirements and Experience                 

  • 2+ years of relevant experience in incident response or similar information security operations role.
  • Bilingual (French and English) is required
  • Bachelor’s degree in Computer Science and/or other relevant security certifications (CISSP, CISM, CISA, CCSP, GCIH, GIAC, OSCP, OSEE, GREM).
  • In-depth experience working in EDR/SIEM/SOAR technologies. 
  • Formal security models, such as, MITRE ATT&CK or CIS Critical Security Controls.
  • Knowledgeable about modern security related subjects and trends, for example, Advanced Persistent Threat (APT), rootkits, Spear Phishing, and credential compromise techniques.
  • Experience in security technologies (i.e. Incident case management, SIEM, SOAR, EDR, Intrusion Prevention, Digital Forensics).
  • Knowledge of security controls and incident response in a multi-platform environment including on-prem and cloud.
  • Experience with other various technologies implemented in a SOC environment: EDR, IDS/IPS, Anti-Virus, network and host-based firewalls, Web proxies, etc.
  • Understanding of basic networking protocols, such as, IP, DNS, HTTP, FTP, SMTP, etc., and the OSI model.
  • Proven ability to participate in large scale projects with high collaboration.
  • Excellent written and oral communications.
  • Excellent judgement, decision making skills, and the ability to work under pressure.
  • Excellent presentation skills and experience of presenting to senior management and senior leaders.
  • Experience with Cloud Computing and technology.
  • Experience with Unix/Linux, or work relating to OS internal or file level forensics.
  • Customer service experience.

Required profile

Experience

Spoken language(s):
FrenchEnglish
Check out the description to know which languages are mandatory.

Other Skills

  • Decision Making
  • Teamwork
  • Communication
  • Customer Service

Incident Response Analyst Related jobs