Incident Response Analyst
Job Description
Job Description
About Us
Thrive is a rapidly growing technology solutions provider focusing upon Cloud, Cyber Security, Networking, Disaster Recovery and Managed Services. Our corporate culture, engineering talent, customer-centric approach, and focus upon “next generation” services help us stand out amongst our peers. Thrive is on the look-out for individuals who don’t view their weekdays spent at “a job” but rather look to develop valuable skills that ignite their passion and lead to a CAREER. If you’re attracted to a “work hard, play hard” environment, seeking the guidance, training and experience necessary to build a lucrative career, then welcome to THRIVE!!
Position OverviewWith a growing client base, Thrive is expanding its security team. We are looking for an experienced Incident Response Analyst Team Lead to join our Cyber Security Incident Response Team. This pivotal role involves leading incident response efforts, mentoring analysts, and continuously improving our customers' security posture by preventing, detecting, analyzing, and responding to cybersecurity incidents using cutting-edge technology and robust processes.
The ideal candidate will bring a blend of leadership, deep technical expertise, and a passion for incident response and forensics. They will play a key role in handling high-priority incidents, refining incident response processes, and mentoring team members to ensure operational excellence.
Primary Responsibilities
Provide mentorship, coaching, and guidance to SOC Analysts and Incident Response Analyst
Foster collaboration across teams to enhance threat intelligence sharing and operational efficiency
Act as a point of escalation for complex investigations and high-priority incidents
Lead incident response and threat hunting efforts for confirmed high-priority security incidents, ensuring resolution and documentation
Investigate intrusion attempts, differentiate false positives from actual threats, and perform in-depth analysis of exploits
Proactively monitor and respond to emerging threats using advanced tools and methodologies
Conduct forensic analysis, including memory and disk imaging, to identify evidence of compromise and attacker activity
Collect, preserve, and analyze digital evidence to support investigations and potential legal actions
Utilize forensic tools to uncover artifacts such as deleted files, malware remnants, and network traces
Develop and maintain incident response playbooks, ensuring alignment with the overall security strategy
Conduct regular reviews and updates of playbooks to address evolving threats and technologies
Participate in tabletop exercises to validate and refine playbooks and incident response procedures
Analyze SOC, SIEM, and EDR platform data to identify and escalate potential threats.
Collaborate with cross-functional teams to implement security best practices for internal and external clients
Ensure adherence to Thrive’s security standards while recommending future enhancements to tools and workflows
Utilize threat intelligence to identify potential security risks and proactively mitigate them
Stay current on emerging threats, vulnerabilities, and adversarial tactics, techniques, and procedures (TTPs)
Qualifications
Required Skills and Experience
Demonstrated experience in incident handling, escalation management, or leading high-priority incident investigations
Demonstrated expertise in best security practices and incident response methodologies.
Advanced knowledge of:
Security Information and Event Management (SIEM) tools
Networking (TCP/IP, routing, and switching)
IDS/IPS, penetration testing, and vulnerability assessments
Windows, UNIX, and Linux operating systems
Network protocols and packet analysis tools
Endpoint Detection and Response (EDR), antivirus, and anti-malware tools
Content filtering and email/web gateways
Hands-on experience in forensics, malware analysis, and intrusion detection
Familiarity with industry frameworks such as MITRE ATT&CK and the Cyber Kill Chain
Proven ability to communicate complex security issues to clients, peers, and management
Strong analytical, problem-solving, and decision-making skills
Adaptability to rapidly evolving situations and technologies
Ability to participate in an on-call rotation for high-priority incidents
Preferred Skills
Knowledge of common system calls and APIs for Windows and Linux/Unix environments
Experience with programming languages relevant to security analysis and automation
Understanding of internal file structures commonly associated with malware
Experience in detection engineering and creating high-fidelity detection rules
Advanced cloud security knowledge and expertise in investigating cloud-based intrusions
Desired Certifications
Computer Hacking Forensic Investigator (CHFI)
GIAC Certified Forensic Analyst (GCFA)
GIAC Certified Forensic Examiner (GCFE)
Certified Incident Handler (GCIH)
Powered by JazzHR
ybroC2QDTK
Recommended Jobs
Nursing Unit Manager
We are hiring Unit Managers to join our dynamic care team at The Oxford Rehabilitation & Health Care Center in Haverhill! Openings include: ~24 hours on weekends (7a-7p) ~40 hours on 11p-7a …
ABA Program Manager (PM) - Center Based
Join the largest female clinician-led ABA agency in the country and work with people who just get it. At Autism Learning Partners, we’re all about growing together, learning from each other, and actu…
Event Marketing Coordinator
Job Description Job Description We are seeking an Event Marketing Coordinator to join our team! You will be responsible for gathering and analyzing key market information, as well as identifying …
Assistant System Controller
POSITION SUMMARY : Reporting to the Controller, the Assistant System Controller will support the Controller and the Finance Leadership team in managing BMCHS’s (BMC, St. Elizabeth, and Good Sam…
Senior Construction Manager
Job Description Job Description Job Title: Project Manager – Multifamily Construction Experience Level: Senior Level Projects located in Central MA – Avoid lengthy commutes and Boston Tr…
Assistant Seafood Manager
Position Title: Assistant Seafood Manager Department: Seafood Supervisor: Seafood Manager FLSA: Full-Time, Hourly, 8-10 hour shift, Overtime Restaurant Depot is a wholesale cash-and-carr…
Bulk Quality Assurance Technician
Job Description Job Description Description: Do you take pride in doing things right the first time? Looking for a stable job with room to grow? Ready to join a team that treats you like fam…
Gymnastics & Birthday Party Coach
Job Description Job Description Benefits: Company parties Employee discounts Flexible schedule Free food & snacks Free uniforms Opportunity for advancement Training & develop…