Full-Time

Incident Response Analyst

Confirmed live in the last 24 hours

Core Specialty

Core Specialty

Consulting
Financial Services

Mid

No H1B Sponsorship

Dallas, TX, USA + 1 more

More locations: Cincinnati, OH, USA

Requires hybrid schedule in Dallas or Cincinnati offices.

Category
Cybersecurity
IT & Security
Required Skills
PowerShell
Python
Splunk
Requirements
  • Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or a related field; relevant certifications are a plus.
  • 3 years of experience in cybersecurity, with a focus on incident response and analysis.
  • Experience with SIEM tools (e.g., Splunk, ArcSight) and other security technologies (e.g., firewalls, intrusion detection/prevention systems).
  • Strong understanding of security principles, threat landscapes, and incident response methodologies.
  • Familiarity with regulatory requirements and compliance frameworks (e.g., NIST, ISO 27001).
  • Knowledge of scripting or programming languages (e.g., Python, PowerShell) for automation and analysis tasks preferred.
  • Familiarity with incident response frameworks and tools (e.g., The MITRE ATT&CK Framework) preferred.
  • Excellent analytical and problem-solving skills, with attention to detail.
  • Strong communication and interpersonal skills, capable of collaborating with both technical and non-technical stakeholders.
  • Ability to work under pressure and manage multiple priorities effectively.
  • Relevant certifications such as GCIH, CEH, or Security+ are highly desirable.
Responsibilities
  • Continuously monitor security alerts and incidents using Security Information and Event Management (SIEM) tools and other monitoring solutions.
  • Analyze security events to identify anomalies and potential threats, escalating issues as necessary.
  • Investigate and respond to security incidents, coordinating containment and eradication efforts.
  • Conduct root cause analysis to understand the nature and scope of incidents and identify weaknesses.
  • Maintain detailed documentation of incidents, response actions, and lessons learned.
  • Prepare incident reports and presentations for management, highlighting key findings and recommendations.
  • Work closely with IT, network, and system administrators to implement security controls and ensure the integrity of systems.
  • Collaborate with legal and compliance teams to ensure adherence to regulations and reporting requirements.
  • Assist in the development and refinement of incident response plans, policies, and procedures.
  • Participate in post-incident reviews and recommend improvements to enhance the organization’s security posture.
  • Provide support in cybersecurity training and awareness programs for employees.
  • Assist in conducting tabletop exercises and simulations to test incident response effectiveness.

Company Stage

M&A

Total Funding

N/A

Headquarters

Cincinnati, Ohio

Founded

2020

Simplify Jobs

Simplify's Take

What believers are saying

  • Increased demand for digital platforms boosts Core Specialty's insurtech growth potential.
  • Cyber insurance market growth presents significant opportunities for Core Specialty.
  • AI integration in underwriting improves Core Specialty's risk assessment and efficiency.

What critics are saying

  • Competition from Corvus Insurance may impact Core Specialty's tech and cyber market share.
  • Merger integration challenges with Lancer Insurance could affect service delivery.
  • Reliance on AllDigital's technology may lead to operational disruptions.

What makes Core Specialty unique

  • Core Specialty's partnership with AllDigital enhances digital policy issuance efficiency.
  • The merger with Lancer Insurance expands Core Specialty's market reach and capabilities.
  • Investment in Gramercy Risk strengthens Core Specialty's specialty insurance offerings.

Help us improve and share your feedback! Did you find this helpful?