Remote Cyber security Jobs · Incident Response

Job listings

$130,000–$150,000/yr

The Security Operations team is a central pillar of our growth strategy, and Vultr is looking for a Senior Manager of Incident Response to oversee the day-to-day operations of the incident management and response team. This role involves executing incident response strategies, coordinating with cross-functional teams during security incidents, and improving processes based on post-incident reviews.

This position requires work hours of 4:45 PM to 1:00 AM EST, where you'll be responsible for cyber threat intelligence, event monitoring, response, and threat hunting. As a member of the Cyber Response team, utilize your technical expertise to assess, contain, and remediate cyber threats, mentor and share knowledge with others, and manage workflows, escalations, and advance technical processes to build program maturity and growth.

Perform real-time monitoring and analysis of security events and alerts from various security tools, including SIEM (Sentinel), Microsoft Defender Suite, Firewalls, IDS/IPS, WAFs, and other security logs. Analyze telemetry from Microsoft Defender products within Microsoft Sentinel. Conduct in-depth investigations of escalated security incidents, performing root cause analysis to understand the full scope and impact.

$123,200–$184,800/yr

As Senior Information Security Analyst III, you will be a key contributor to our day-to-day security operations, assisting with threat monitoring, incident triage, vulnerability remediation, and GRC activities. This role is an excellent opportunity for someone with security experience who is eager to grow their skills in risk management, cloud environments and security best practices.

Cybersecurity Analysts focused on Digital Forensics and Incident Response (DFIR) deliver incident investigation and response services to At-Bay insureds. Responsibilities include analysis of digital evidence to identify indicators of compromise and adversary activity, development of incident timelines and theories of compromise, identification of incident root causes, and participation in threat actor negotiations as necessary.

This role is client-facing and requires the Principal Consultant to lead and produce deliverables based on reactive services client engagements. The Principal Consultant will work directly with multiple customers and key stakeholders (Admins, C-Suite, etc) to manage incident response engagements and provide guidance on longer term remediation. Perform reactive incident response functions including host-based analysis, examining log sources to identify malicious activity, and investigating data breaches.