Recent Searches

You haven't searched anything yet.

2 Cyber Incident Response Analyst Jobs in Cleveland, OH

SET JOB ALERT
Details...
ASMGi
Cleveland, OH | Full Time
$76k-99k (estimate)
11 Months Ago
Deloitte
Cleveland, OH | Full Time
$72k-92k (estimate)
2 Months Ago
Cyber Incident Response Analyst
ASMGi Cleveland, OH
$76k-99k (estimate)
Full Time 11 Months Ago
Save

ASMGi is Hiring a Cyber Incident Response Analyst Near Cleveland, OH

ASMGi - Cyber Incident Response Analyst
General Summary:
As a key member of ASMGi’s Information Security Incident Response Team this individual will be responsible for various parts of the incident response process - detection, validation, containment, remediation, and communication - for IT based security events and incidents impacting ASMGi’s clients.
This individual will be responsible for the rapid response and resolution of security incidents including the ASMGi MDR / MSOC plus client’s environments. This will involve coordinating with teams including Legal, Security Operations and Forensics experts, internal or external, to identify root cause, restore services and communicate status to affected stakeholders.
This role will act as the escalation path for the ASMGi Operations Team to validate findings and identify scope of events and support during larger investigations. This individual will act as an internal and client facing resource while interacting with the third-party Security Operations Center as applicable.
Principal Accountabilities:
25% - Client Incident Response Onboarding and Program Development.
  • Work with ASMGi MDR / MSOC plus Service clients as part of the overall service and specifically the Incident Response Program Development including Incident Response Policy, Incident Response Plan, and Incident Response Playbook development and adoption.
  • Conduct client Tabletop Exercises on an annual basis based on the adopted Incident Response Playbook as part of the ASMGi MDR / MSOC plus Incident Response Service.
50% - Incident Response
  • Perform Level 2 and Level 3 computer security incident response activities including coordinating with the Security Operations Center and Forensics experts, internal and external.
  • Analyze, track and triage anomalies that have been escalated to ensure appropriate identification of risk to ASMGi MDR / MSOC plus clients.
  • Oversee the forensic analysis of cybersecurity incidents impacting ASMGi MDR / MSOC plus clients.
  • Understand and research emerging threats and current trends that may impact customers along with mitigation/resolutions for such threats.
  • Communicate and coordinate response efforts including working with ASMGi MDR / MSOC plus client’s I.T., Business Leaders, and Third Parties to mitigate the impact of the risk and provide a lead role as part of the ASMGi Computer Security Incident Response Team (CSIRT).
  • Prepare incident reports of analysis and methodology and results of investigation to be submitted to ASMGi MDR / MSOC plus clients.
25% - Assist with Incident Management Strategy Development, Consulting and Management of Third-Party Security Operations Center.
  • Leverage lessons learned, threat modeling and emerging industry better practice, to analyze the effectiveness of the existing program (policies, technology, and awareness) to continuously improve the Incident Management Program.
  • Review industry frameworks, emerging threats, and best practice to advance the ASMGi MDR / MSOC plus Service.
  • Partner with ASMGi partners and internal groups to improve the ASMGi MDR / MSOC plus service and capabilities.
  • Assist with management of third-party business relationships for the security operations center and service levels. Identify potential gaps including procedures needed to mitigate risk and assist with appropriate solutions.
Job Complexity
  • Appropriately balances security risk and business impact to ensure that ASMGi’s use of detection/response controls are effective.
  • Ability to build operational processes using industry best-practice that are tailored to the ASMGi MDR / MSOC plus client’s organization, system, and processes.
  • Ability to effectively communicate risk including corrective action plans/recommendations to non-technical audiences including the ASMGi MDR / MSOC plus client’s Executives and the Board of Directors leveraging the MDR / MSOC plus service.
  • Ability to create effective reports and presentations tailored to different audiences to ensure transparency and understanding of the ASMGi MDR / MSOC plus Service.
  • Assist with development of MDR / MSOC plus Service roadmap.
Job Specifications
Minimum education required: Bachelor's Degree Required
Education desired: Bachelor of Science
Years of relevant experience: 7 – 10
Knowledge, skills, and abilities required:
  • High level of technical expertise in information security, including deep familiarity with relevant penetration and intrusion techniques and attack vectors.
  • Cybersecurity in large complex companies including knowledge of security and privacy breach laws and regulatory reporting.
  • Proven experience working with Security Operations Center services, forensics firms.
  • Demonstrated ability to lead and develop cohesive and collaborative management and operational teams internally and with a third-party.
  • Proven experience implementing policies, procedures, and technology to detect and recover from a cybersecurity attack.
  • Ability to demonstrate strong computer knowledge networks, desktops, servers, cloud, and software as a service technology.
  • Expertise with next generation firewalls, Endpoint Detection and Response, Microsoft Advanced Threat Protection, Azure, and Office 365, Zero Day Threat Detection Technology, Threat Intelligence Feeds, Forensics, Data Loss Prevention Software, Web Proxies, Web Application Firewalls.
  • Strong problem-solving and trouble-shooting skills.
  • Strong communication skills including writing reports and presenting to senior executives.
  • Demonstrated connections to external Incident Response leaders and learning organizations.
Working Conditions
  • Normal corporate office environment and remote / virtual based on COVID-19.
  • On call work is required.

Job Summary

JOB TYPE

Full Time

SALARY

$76k-99k (estimate)

POST DATE

06/05/2023

EXPIRATION DATE

06/05/2024

WEBSITE

asmgi.com

HEADQUARTERS

Cleveland, OH

SIZE

25 - 50

Show more

ASMGi
Full Time
$47k-58k (estimate)
11 Months Ago
ASMGi
Remote | Full Time
$70k-93k (estimate)
3 Months Ago
ASMGi
Full Time
$80k-103k (estimate)
3 Months Ago

The job skills required for Cyber Incident Response Analyst include Cybersecurity, Incident Response, Information Security, Forensics, Triage, Problem Solving, etc. Having related job skills and expertise will give you an advantage when applying to be a Cyber Incident Response Analyst. That makes you unique and can impact how much salary you can get paid. Below are job openings related to skills required by Cyber Incident Response Analyst. Select any job title you are interested in and start to search job requirements.

For the skill of  Cybersecurity
BTAS
Full Time
$97k-125k (estimate)
4 Months Ago
For the skill of  Incident Response
ohio farmers insurance
Full Time
$63k-78k (estimate)
1 Day Ago
For the skill of  Information Security
Westfield
Full Time
$103k-126k (estimate)
1 Week Ago
Show more

The following is the career advancement route for Cyber Incident Response Analyst positions, which can be used as a reference in future career path planning. As a Cyber Incident Response Analyst, it can be promoted into senior positions as a Cyber Incident Response Specialist III that are expected to handle more key tasks, people in this role will get a higher salary paid than an ordinary Cyber Incident Response Analyst. You can explore the career advancement for a Cyber Incident Response Analyst below and select your interested title to get hiring information.

Deloitte
Remote | Full Time
$72k-92k (estimate)
2 Months Ago