Job Summary

Incident Response Analyst (REMOTE)

  • Location:
    Santa Monica , California
  • Category:
  • Contract Type:
    Contract/Temp to Hire
  • Job reference:

Our client located in Santa Monica seeking an Incident Response Analyst to support scaling and maturing the incident response program, within Information Security. This role will aid in identifying, developing, implementing, and maintaining processes across the organization to catch and prevent security related incidents, and perform active IR investigations.
**The client is open to REMOTE-based candidates for this role**
• Will oversee all incidents related to the security of Customers
• Implement new SOC processes and training material.
• Mature and socialize an IR Standard Operating Procedure.
• Design tools and data visualizations to quickly quantify root cause issues.
What you’ll need:
• Bachelor’s degree in computer science, or equivalent training and experience.
• Minimum of three (3) years of experience performing host or network intrusion and
incident response.
• Experience with systems administration, network engineering, and security
• Knowledge of host and network log sources that apply to investigation, IR
methodology in investigations, and the groups behind targeted attacks and tactics,
techniques, and procedures (TTPs)
• Ability to perform analysis with strict attention to detail and display solution
orientation to learn and adapt quickly.
• Ability to lead and serve a team to complete the mission and work well under
pressure to rapidly scope and investigate incidents.
• Knowledge of networking concepts and analysis tools and operating systems,
software, and security controls.
• Ability to perform independent research and report on findings.
• Ability to apply originality and creativity to problem-solving.
• Must be detail-oriented, self-starter and a quick learner.
• Possess excellent oral and written communication skills to communicate effectively
under normal and stressful situations
• Experience leading small teams and mentoring junior staff in an open and positive
• Ability to quickly analyze large amounts of information and formulate action plans
based on that analysis.
Other things we like:
• Background working in a growth stage startup
• Experience synthesizing threat intel and communicating that to various stakeholders
• Ability to leverage python or similar languages to automate processes and tools
• Experience with data management solutions in the incident and security space (i.e.
Splunk, traditional SEIMs, BI tools)

Apply Below


Note: Required fields marked with an asterisk (*).


Primary Number
[Ctrl (Cmd Mac) + Click] to select multiple industries
Upload your resume
Terms of Use


Upload your resume using

All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, or protected veteran status and will not be discriminated against on the basis of disability.

Equal employment opportunity information:
EEO is the Law (poster) | EEO is the Law (poster supplement) | Reaffirmation of Affirmative Action Policy Statement