Cyber Incident Analyst

Cyber Incident Analyst

Posted 3 days ago by Kforce Technology Staffing

Negotiable
Undetermined
Hybrid
Remote or Boston, Massachusetts

Summary: The Cyber Incident Analyst role involves monitoring, triaging, and responding to security alerts while leading complex cyber incident investigations. The position requires extensive experience in information security, particularly in incident response and threat hunting, and demands strong analytical and communication skills. The analyst will also be responsible for developing threat detection rules and communicating findings to stakeholders. This role is based in Boston, MA, with the possibility of remote work.

Key Responsibilities:

  • Monitor, triage, and respond to security alerts across network, endpoint, cloud, identity, and email systems
  • Lead complex cyber incident investigations from detection through resolution
  • Manage multiple investigations and coordinate cross-functional response teams
  • Perform root cause analysis including malware, forensic, and log analysis
  • Develop, tune, and maintain threat detection rules and incident playbooks
  • Analyze and apply threat intelligence to improve detection and response
  • Communicate incident status, findings, and remediation recommendations to stakeholders
  • Produce incident metrics, reporting, and security posture insights
  • Participate in risk assessments and emerging threat evaluations
  • Provide rotational on-call support for critical incidents

Key Skills:

  • Bachelor's degree in a related field or equivalent experience
  • 10+ years in information security with significant SOC, NOC, or CIRT experience
  • 8+ years of hands-on incident response and threat hunting experience
  • Advanced knowledge of SIEM, EDR, cloud security, intrusion detection, and malware remediation
  • Strong experience with forensic analysis tools and malicious code investigations
  • Expertise with Windows and Linux operating systems
  • Knowledge of NIST and regulated environments including HIPAA, GDPR, PCI, or FedRAMP
  • Strong analytical, investigative, and root cause analysis skills
  • Excellent written and verbal communication skills with executive reporting experience
  • Proven ability to operate under pressure during high-severity incidents
  • Experience with common security tools and platforms such as CrowdStrike, Prisma Cloud, Tenable, AWS, Azure, and Google Cloud Platform
  • Relevant SANS certifications preferred

Salary (Rate): £61.00 hourly

City: Boston

Country: United States

Working Arrangements: hybrid

IR35 Status: undetermined

Seniority Level: undetermined

Industry: IT

Detailed Description From Employer:

RESPONSIBILITIES:
Kforce has a client in need of a Cyber Incident Analyst in Boston, MA.

Responsibilities:
* Monitor, triage, and respond to security alerts across network, endpoint, cloud, identity, and email systems
* Lead complex cyber incident investigations from detection through resolution
* Manage multiple investigations and coordinate cross-functional response teams
* Perform root cause analysis including malware, forensic, and log analysis
* Develop, tune, and maintain threat detection rules and incident playbooks
* Analyze and apply threat intelligence to improve detection and response
* Communicate incident status, findings, and remediation recommendations to stakeholders
* Produce incident metrics, reporting, and security posture insights
* Participate in risk assessments and emerging threat evaluations
* Provide rotational on-call support for critical incidents

REQUIREMENTS:
* Bachelor's degree in a related field or equivalent experience
* 10+ years in information security with significant SOC, NOC, or CIRT experience
* 8+ years of hands-on incident response and threat hunting experience
* Advanced knowledge of SIEM, EDR, cloud security, intrusion detection, and malware remediation
* Strong experience with forensic analysis tools and malicious code investigations
* Expertise with Windows and Linux operating systems
* Knowledge of NIST and regulated environments including HIPAA, GDPR, PCI, or FedRAMP
* Strong analytical, investigative, and root cause analysis skills
* Excellent written and verbal communication skills with executive reporting experience
* Proven ability to operate under pressure during high-severity incidents
* Experience with common security tools and platforms such as CrowdStrike, Prisma Cloud, Tenable, AWS, Azure, and Google Cloud Platform
* Relevant SANS certifications preferred

The pay range is the lowest to highest compensation we reasonably in good faith believe we would pay at posting for this role. We may ultimately pay more or less than this range. Employee pay is based on factors like relevant education, qualifications, certifications, experience, skills, seniority, location, performance, union contract and business needs. This range may be modified in the future.

We offer comprehensive benefits including medical/dental/vision insurance, HSA, FSA, 401(k), and life, disability & ADD insurance to eligible employees. Salaried personnel receive paid time off. Hourly employees are not eligible for paid time off unless required by law. Hourly employees on a Service Contract Act project are eligible for paid sick leave.

Note: Pay is not considered compensation until it is earned, vested and determinable. The amount and availability of any compensation remains in Kforce's sole discretion unless and until paid and may be modified in its discretion consistent with the law.

This job is not eligible for bonuses, incentives or commissions.

Kforce is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected veteran status, or disability status.

By clicking ?Apply Today? you agree to receive calls, AI-generated calls, text messages or emails from Kforce and its affiliates, and service providers. Note that if you choose to communicate with Kforce via text messaging the frequency may vary, and message and data rates may apply. Carriers are not liable for delayed or undelivered messages. You will always have the right to cease communicating via text by using key words such as STOP.