Lead Cyber Incident Response Technician Position Available In Guilford, North Carolina
Tallo's Job Summary: This job listing in Guilford - NC has been recently added. Tallo will add a summary here for this job shortly.
Job Description
Lead Cyber Incident Response Technician Pioneer IT Systems(425) 458-7002 Greensboro, NC Job Details Contract $50•$80 an hour 10 hours ago Qualifications 7 years Operating systems 6 years Management Computer Science 5 years 11+ years Windows Information security 8 years Analysis skills Bachelor’s degree NIST standards IDS Perl Mentoring Scripting macOS SIEM Linux Root cause analysis Cybersecurity Senior level Attack Frameworks Communication skills Python PowerShell 10 years
Full Job Description Role:
Senior Cyber Défense
Incident Responder Location:
Greensboro, NC•
Onsite Duration:
Long Term As a Senior Cyber Defense Incident Responder within the Global Cybersecurity Operations Center ( CSOC ), you will serve as a key technical expert, responsible for responding to sophisticated cyber threats, leading incident investigations, & strengthening the organization’s cybersecurity posture. This role requires a combination of hands•on technical expertise & mentoring skills to drive effective threat detection, rapid incident response, & continuous improvements in SOC operations. Key Responsibilities Analyze & respond to complex security incidents & alerts generated by SOC tools ( e.g., SIEM, EDR, IDS / IPS ). Investigate & resolve escalated incidents from Level 1 & Level 2 analysts, ensuring timely containment & remediation. Lead end-to-end investigations involving malware infections, data breaches, insider threats, & other advanced attacks. Conduct digital forensics to collect, analyze, & preserve evidence in compliance with legal & regulatory standards. Produce detailed incident reports including root cause analysis & actionable recommendations. Leverage threat intelligence to identify indicators of compromise ( IOCs ) & anticipate emerging threats. Mentor & guide junior SOC analysts to promote knowledge-sharing & professional development. Collaborate with IT, security, & business stakeholders to implement & refine security controls. Drive continuous improvement of SOC workflows, tools, & technologies for enhanced operational effectiveness. Identify gaps in detection & response capabilities & provide strategic recommendations for improvement. Required Qualifications Bachelor’s degree in Computer Science, Information Security, or a related technical discipline. Minimum of 5 years of experience in cybersecurity with at least 3 years supporting cyber defense operations in large enterprise environments ( SOC, SIRT, or CSIRT ). Strong understanding of Advanced Persistent Threats ( APT ), cybercrime, & hacktivist tactics, techniques, & procedures ( TTPs ). Proficient in incident handling, threat lifecycle management, & root cause analysis. Deep knowledge of operating systems (Windows, Linux, macOS), network & application layer protocols. Hands•on experience with SIEM tools, EDR platforms, IDS / IPS, sandboxing solutions, & email security technologies. Experience in scripting ( e.g., PowerShell, Python, Perl ) for automation & investigation tasks. Familiarity with
MITRE ATT&CK, NIST
Framework, Cyber Kill Chain, & SANS CSC frameworks. Understanding of modern cryptographic systems & network security architectures. Ability to analyze & triage alerts, develop detection content, & implement countermeasures. Strong analytical, technical writing, & communication skills for both technical & executive audiences.
Job Type:
Contract Pay:
$50.00•$80.00 per hour
Schedule:
8 hour shift
Work Location:
In person