Senior Incident Responder
TENEX.AI
Job Summary:
TENEX.AI is seeking a highly skilled and experienced core individual contributor and leader to join our dynamic Security Operations Center (SOC) as a Senior Incident Responder. As a key member of our incident response team, you will be responsible for leading and executing the end-to-end investigation and remediation of complex security incidents. The position offers significant opportunities for professional growth within a collaborative and forward-thinking environment.
A strong technical background, exceptional analytical and problem-solving skills are crucial for this role, along with the ability to drive process improvement, create comprehensive documentation, and serve as a critical escalation point for incident handling. You will also play a vital role in the selection and effective utilization of specialized investigative tools.
Responsibilities:
Mentorship and Training: Provide guidance, mentorship, and knowledge sharing to junior incident responders, contributing to the overall growth and skill development of the team.
Client Communication: Effectively communicate technical details and incident status to both technical and non-technical client stakeholders, maintaining professionalism and building trust.
Escalation Point: Serve as a primary escalation point for complex or high-severity security incidents, providing expert guidance and support to junior analysts and other stakeholders.
Process Development and Improvement: Identify areas for improvement within existing incident response processes and and contribute to the development, implementation, and maintenance of standardized procedures, playbooks, and workflows.
Incident Investigation and Handling: Lead and conduct in-depth investigations of security incidents, including malware infections, intrusions, data breaches, phishing campaigns, and other cyber threats. This includes containment, eradication, and recovery efforts.
End-to-End Case Management: Manage incident response cases from initial detection through final resolution, ensuring timely communication with stakeholders, meticulous documentation, and adherence to established SLOs.
Documentation and Reporting: Create and maintain comprehensive documentation, including incident timelines, analysis reports, root cause analyses, lessons learned, and client-facing summaries.
Tooling and Technology: Evaluate, select, and effectively utilize a variety of specialized security tools and technologies for incident investigation, forensic analysis, and threat intelligence gathering. This may include custom tooling, threat intelligence and network analysis tools, and forensic suites.
Continuous Learning: Stay up-to-date with the latest cybersecurity threats, trends, and incident response techniques through continuous learning and professional development.
Qualifications:
Minimum of 5+ years of experience in incident response, security operations, or a related cybersecurity role.
Proven experience in leading and managing complex security incident investigations from start to finish.
Strong understanding of common attack vectors, tactics, and procedures (TTPs) used by threat actors.
Strong subject matter expertise in at least one of the following areas, with strong foundation in the others: network protocols, operating systems (Windows, Linux, macOS), and cloud environments (AWS, Azure, GCP).
Bachelor's degree in Computer Science, Information Security, or a related field, or equivalent practical experience.
Hands-on experience with a variety of security tools and technologies, such as SIEM, EDR, firewalls, intrusion detection/prevention systems (IDS/IPS), and forensic analysis tools.
Excellent analytical, problem-solving, and critical thinking skills.
Strong written and verbal communication skills, with the ability to articulate technical information clearly and concisely to diverse audiences.
Ability to work independently and collaboratively within a team environment.
Strong organizational skills and attention to detail.
Ability to remain calm and effective under pressure during high-severity incidents.
Preferred Qualifications:
Experience with scripting languages (e.g., Python, PowerShell) for automation and analysis.
Experience working in a Managed Security Services Provider (MSSP) environment.
Familiarity with threat intelligence platforms and their integration into incident response workflows.
Experience developing and implementing incident response playbooks and procedures.
Experience with digital forensics and evidence handling.
Relevant security certifications such as GCIH, GCFA, GREM, CISSP, or equivalent.