Careers

Supporting the innovators who will secure our future

Senior Incident Responder

TENEX.AI

TENEX.AI

Kansas City, MO, USA
Posted on Apr 25, 2025

Job Summary:

TENEX.AI is seeking a highly skilled and experienced core individual contributor and leader to join our dynamic Security Operations Center (SOC) as a Senior Incident Responder. As a key member of our incident response team, you will be responsible for leading and executing the end-to-end investigation and remediation of complex security incidents. The position offers significant opportunities for professional growth within a collaborative and forward-thinking environment.

A strong technical background, exceptional analytical and problem-solving skills are crucial for this role, along with the ability to drive process improvement, create comprehensive documentation, and serve as a critical escalation point for incident handling. You will also play a vital role in the selection and effective utilization of specialized investigative tools.

Responsibilities:

  • Mentorship and Training: Provide guidance, mentorship, and knowledge sharing to junior incident responders, contributing to the overall growth and skill development of the team.

  • Client Communication: Effectively communicate technical details and incident status to both technical and non-technical client stakeholders, maintaining professionalism and building trust.

  • Escalation Point: Serve as a primary escalation point for complex or high-severity security incidents, providing expert guidance and support to junior analysts and other stakeholders.

  • Process Development and Improvement: Identify areas for improvement within existing incident response processes and and contribute to the development, implementation, and maintenance of standardized procedures, playbooks, and workflows.

  • Incident Investigation and Handling: Lead and conduct in-depth investigations of security incidents, including malware infections, intrusions, data breaches, phishing campaigns, and other cyber threats. This includes containment, eradication, and recovery efforts.

  • End-to-End Case Management: Manage incident response cases from initial detection through final resolution, ensuring timely communication with stakeholders, meticulous documentation, and adherence to established SLOs.

  • Documentation and Reporting: Create and maintain comprehensive documentation, including incident timelines, analysis reports, root cause analyses, lessons learned, and client-facing summaries.

  • Tooling and Technology: Evaluate, select, and effectively utilize a variety of specialized security tools and technologies for incident investigation, forensic analysis, and threat intelligence gathering. This may include custom tooling, threat intelligence and network analysis tools, and forensic suites.

  • Continuous Learning: Stay up-to-date with the latest cybersecurity threats, trends, and incident response techniques through continuous learning and professional development.

Qualifications:

  • Minimum of 5+ years of experience in incident response, security operations, or a related cybersecurity role.

  • Proven experience in leading and managing complex security incident investigations from start to finish.

  • Strong understanding of common attack vectors, tactics, and procedures (TTPs) used by threat actors.

  • Strong subject matter expertise in at least one of the following areas, with strong foundation in the others: network protocols, operating systems (Windows, Linux, macOS), and cloud environments (AWS, Azure, GCP).

  • Bachelor's degree in Computer Science, Information Security, or a related field, or equivalent practical experience.

  • Hands-on experience with a variety of security tools and technologies, such as SIEM, EDR, firewalls, intrusion detection/prevention systems (IDS/IPS), and forensic analysis tools.

  • Excellent analytical, problem-solving, and critical thinking skills.

  • Strong written and verbal communication skills, with the ability to articulate technical information clearly and concisely to diverse audiences.

  • Ability to work independently and collaboratively within a team environment.

  • Strong organizational skills and attention to detail.

  • Ability to remain calm and effective under pressure during high-severity incidents.

Preferred Qualifications:

  • Experience with scripting languages (e.g., Python, PowerShell) for automation and analysis.

  • Experience working in a Managed Security Services Provider (MSSP) environment.

  • Familiarity with threat intelligence platforms and their integration into incident response workflows.

  • Experience developing and implementing incident response playbooks and procedures.

  • Experience with digital forensics and evidence handling.

  • Relevant security certifications such as GCIH, GCFA, GREM, CISSP, or equivalent.