Назад
Company hidden
23 часа назад

SOC Analyst & Incident Response Lead (Cybersecurity)

93 000 - 125 500$
Формат работы
remote (только USA)
Тип работы
fulltime
Грейд
lead
Английский
b2
Страна
US
Вакансия из списка Hirify.GlobalВакансия из Hirify Global, списка международных tech-компаний
Для мэтча и отклика нужен Plus

Мэтч & Сопровод

Для мэтча с этой вакансией нужен Plus

Описание вакансии

Текст:
/

TL;DR

SOC Analyst & Incident Response Lead (Cybersecurity): Managing critical security events and conducting forensic investigations with an accent on Tier 3 escalation and the end-to-end incident response lifecycle. Focus on solving complex security breaches, performing malware analysis, and optimizing detection engineering within Azure environments.

Location: Remote (US). Applicants must be currently authorized to work in the United States without the need for visa sponsorship

Salary: $93,000 – $125,500 + bonus

Company

hirify.global is an enterprise software leader that provides unified communication and fragmented customer experience solutions for large organizations and government agencies.

What you will do

  • Act as the final escalation point for complex security alerts and incidents identified through Azure Sentinel.
  • Conduct in-depth digital forensic investigations across endpoints, networks, and cloud infrastructure (Azure, M365, Microsoft Dynamics).
  • Lead and coordinate the end-to-end incident response lifecycle, from detection through containment, eradication, and recovery.
  • Perform malware analysis, reverse engineering, and memory/disk analysis to support incident triage.
  • Mentor and coach Tier 1 and Tier 2 SOC analysts to raise overall team capabilities.
  • Collaborate with SIEM engineers to tune and optimize detection use cases for emerging threats.

Requirements

  • 5+ years of experience in a Security Operations Center or Incident Response role.
  • Proven experience leading major incident response efforts, such as ransomware, APTs, or data breaches.
  • Advanced proficiency in Microsoft Sentinel, Defender for Endpoint, and forensic toolsets.
  • Strong forensic analysis skills covering disk, memory, log, and network forensics.
  • Hands-on experience with PowerShell or Python for streamlining investigations and response.
  • Current authorization to work in the US without visa sponsorship now or in the future.

Nice to have

  • Certifications: GCFA, GCIH, CISSP, OSCP, or GCIA.
  • Microsoft certifications: SC-200, SC-300, or AZ-500.

Culture & Benefits

  • Competitive salary with bonus potential.
  • Comprehensive benefits package.
  • Supportive community focused on individual contribution and professional growth.
  • Flexible remote work environment within the US.

Будьте осторожны: если работодатель просит войти в их систему, используя iCloud/Google, прислать код/пароль, запустить код/ПО, не делайте этого - это мошенники. Обязательно жмите "Пожаловаться" или пишите в поддержку. Подробнее в гайде →